/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.110 - (hide annotations)
Sat Jan 3 10:27:14 2026 UTC (2 months, 1 week ago) by sysadm
Branch: MAIN
CVS Tags: HEAD
Changes since 1.109: +1 -1 lines
Content type: text/x-csrc
Update copyright info

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.110 * Copyright (C) 2004-2026 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.84 #include "str_process.h"
22 sysadm 1.55 #include <errno.h>
23     #include <fcntl.h>
24     #include <netdb.h>
25     #include <stdarg.h>
26 sysadm 1.1 #include <stdio.h>
27 sysadm 1.55 #include <stdlib.h>
28 sysadm 1.29 #include <string.h>
29     #include <time.h>
30     #include <unistd.h>
31 sysadm 1.55 #include <arpa/inet.h>
32 sysadm 1.84 #include <ctype.h>
33 sysadm 1.55 #include <libssh/libssh.h>
34     #include <libssh/server.h>
35     #include <libssh/callbacks.h>
36     #include <netinet/in.h>
37     #include <netinet/ip.h>
38 sysadm 1.29 #include <sys/select.h>
39 sysadm 1.1 #include <sys/ioctl.h>
40     #include <sys/socket.h>
41 sysadm 1.82
42     #ifdef HAVE_SYS_EPOLL_H
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.82 #else
45     #include <poll.h>
46     #endif
47 sysadm 1.1
48 sysadm 1.80 enum _bbs_net_constant_t
49     {
50     MAXSTATION = 26 * 2,
51     STATION_PER_LINE = 4,
52 sysadm 1.109 ORG_NAME_MAX_LEN = 40,
53     SITE_NAME_MAX_LEN = 40,
54     HOSTNAME_MAX_LEN = 253,
55     PORT_STR_MAX_LEN = 5,
56 sysadm 1.84 USERNAME_MAX_LEN = 20,
57     PASSWORD_MAX_LEN = 20,
58 sysadm 1.97 REMOTE_CONNECT_TIMEOUT = 10, // seconds
59     SSH_CONNECT_TIMEOUT = 5, // seconds
60     PROGRESS_BAR_LEN = 30,
61 sysadm 1.80 };
62 sysadm 1.1
63     struct _bbsnet_conf
64     {
65 sysadm 1.109 char org_name[ORG_NAME_MAX_LEN + 1];
66     char site_name[SITE_NAME_MAX_LEN + 1];
67     char host_name[HOSTNAME_MAX_LEN + 1];
68     char port[PORT_STR_MAX_LEN + 1];
69 sysadm 1.84 int8_t use_ssh;
70 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
71 sysadm 1.1 } bbsnet_conf[MAXSTATION];
72    
73 sysadm 1.109 static const char MENU_CONF_DELIM[] = " \t\r\n";
74    
75 sysadm 1.74 static MENU_SET bbsnet_menu;
76 sysadm 1.1
77 sysadm 1.89 static void unload_bbsnet_conf(void);
78    
79 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
80 sysadm 1.1 {
81 sysadm 1.109 FILE *fin;
82     int fin_line = 0;
83 sysadm 1.14 MENU *p_menu;
84 sysadm 1.41 MENU_ITEM *p_menu_item;
85     MENU_ITEM_ID menu_item_id;
86 sysadm 1.109 char line[LINE_BUFFER_LEN];
87     char *p = NULL;
88     char *saveptr = NULL;
89 sysadm 1.97 long port;
90     char *endptr;
91 sysadm 1.14
92 sysadm 1.89 unload_bbsnet_conf();
93 sysadm 1.14
94 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
95     if (bbsnet_menu.p_menu_pool == NULL)
96     {
97 sysadm 1.104 log_error("calloc(p_menu_pool) error");
98 sysadm 1.89 return -1;
99 sysadm 1.41 }
100     bbsnet_menu.menu_count = 1;
101    
102     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
103     if (bbsnet_menu.p_menu_item_pool == NULL)
104     {
105 sysadm 1.104 log_error("calloc(p_menu_item_pool) error");
106 sysadm 1.89 unload_bbsnet_conf();
107     return -1;
108 sysadm 1.41 }
109     bbsnet_menu.menu_item_count = MAXSTATION;
110    
111     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
112 sysadm 1.40
113 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
114     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
115 sysadm 1.14 p_menu->title.show = 0;
116 sysadm 1.41 p_menu->screen_show = 0;
117 sysadm 1.1
118 sysadm 1.109 fin = fopen(file_config, "r");
119     if (fin == NULL)
120 sysadm 1.89 {
121     unload_bbsnet_conf();
122     return -2;
123     }
124    
125 sysadm 1.41 menu_item_id = 0;
126 sysadm 1.109 while (fgets(line, sizeof(line), fin) && menu_item_id < MAXSTATION)
127 sysadm 1.14 {
128 sysadm 1.109 fin_line++;
129 sysadm 1.14
130 sysadm 1.109 p = strtok_r(line, MENU_CONF_DELIM, &saveptr);
131     if (p == NULL) // Blank line
132 sysadm 1.18 {
133 sysadm 1.14 continue;
134 sysadm 1.18 }
135    
136 sysadm 1.109 if (*p == '#' || *p == '\r' || *p == '\n') // Comment or blank line
137     {
138     continue;
139     }
140    
141     if (strlen(p) > sizeof(bbsnet_conf[menu_item_id].org_name) - 1)
142     {
143     log_error("Error org_name in BBSNET config line %d", fin_line);
144     continue;
145     }
146     strncpy(bbsnet_conf[menu_item_id].org_name, p, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
147     bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
148    
149     p = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
150     if (p == NULL || strlen(p) > sizeof(bbsnet_conf[menu_item_id].site_name) - 1)
151     {
152     log_error("Error site_name in BBSNET config line %d", fin_line);
153     continue;
154     }
155     strncpy(bbsnet_conf[menu_item_id].site_name, p, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
156 sysadm 1.86 bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
157 sysadm 1.109
158     p = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
159     if (p == NULL || strlen(p) > sizeof(bbsnet_conf[menu_item_id].host_name) - 1)
160     {
161     log_error("Error host_name in BBSNET config line %d", fin_line);
162     continue;
163     }
164     strncpy(bbsnet_conf[menu_item_id].host_name, p, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
165 sysadm 1.86 bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
166 sysadm 1.109
167     p = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
168     if (p == NULL || strlen(p) > sizeof(bbsnet_conf[menu_item_id].port) - 1)
169     {
170     log_error("Error port in BBSNET config line %d", fin_line);
171     continue;
172     }
173     port = strtol(p, &endptr, 10);
174 sysadm 1.97 if (*endptr != '\0' || port <= 0 || port > 65535)
175 sysadm 1.89 {
176 sysadm 1.109 log_error("Invalid port %ld in BBSNET config line %d", port, fin_line);
177     continue;
178 sysadm 1.89 }
179 sysadm 1.109 strncpy(bbsnet_conf[menu_item_id].port, p, sizeof(bbsnet_conf[menu_item_id].port) - 1);
180 sysadm 1.93 bbsnet_conf[menu_item_id].port[sizeof(bbsnet_conf[menu_item_id].port) - 1] = '\0';
181 sysadm 1.109
182     p = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
183     if (p == NULL || strlen(p) != 1)
184     {
185     log_error("Error use_ssh in BBSNET config line %d", fin_line);
186     continue;
187     }
188     bbsnet_conf[menu_item_id].use_ssh = (toupper(p[0]) == 'Y');
189    
190     p = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
191     if (p == NULL || strlen(p) > sizeof(bbsnet_conf[menu_item_id].charset) - 1)
192     {
193     log_error("Error charset in BBSNET config line %d", fin_line);
194     continue;
195     }
196     strncpy(bbsnet_conf[menu_item_id].charset, p, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
197 sysadm 1.60 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
198 sysadm 1.14
199 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
200     if (p_menu_item == NULL)
201     {
202 sysadm 1.109 log_error("get_menu_item_by_id(%d) error: NULL pointer", menu_item_id);
203     fclose(fin);
204 sysadm 1.89 unload_bbsnet_conf();
205     return -3;
206 sysadm 1.41 }
207 sysadm 1.14
208 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
209     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
210     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
211     p_menu_item->submenu = 0;
212     p_menu_item->priv = 0;
213     p_menu_item->level = 0;
214     p_menu_item->name[0] =
215 sysadm 1.97 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id - MAXSTATION / 2);
216 sysadm 1.41 p_menu_item->name[1] = '\0';
217 sysadm 1.89 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
218 sysadm 1.86 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
219 sysadm 1.41
220     p_menu->items[p_menu->item_count] = menu_item_id;
221     p_menu->item_count++;
222     menu_item_id++;
223     }
224    
225     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
226     bbsnet_menu.menu_id_path[0] = 0;
227     bbsnet_menu.menu_item_pos[0] = 0;
228     bbsnet_menu.choose_step = 0;
229 sysadm 1.14
230 sysadm 1.109 fclose(fin);
231 sysadm 1.14
232     return 0;
233 sysadm 1.1 }
234    
235 sysadm 1.74 static void unload_bbsnet_conf(void)
236 sysadm 1.40 {
237 sysadm 1.41 bbsnet_menu.menu_count = 0;
238     bbsnet_menu.menu_item_count = 0;
239    
240 sysadm 1.89 if (bbsnet_menu.p_menu_pool)
241     {
242     free(bbsnet_menu.p_menu_pool);
243     bbsnet_menu.p_menu_pool = NULL;
244     }
245    
246     if (bbsnet_menu.p_menu_item_pool)
247     {
248     free(bbsnet_menu.p_menu_item_pool);
249     bbsnet_menu.p_menu_item_pool = NULL;
250     }
251 sysadm 1.40 }
252    
253 sysadm 1.97 static void progress_bar(int percent, int len)
254 sysadm 1.1 {
255 sysadm 1.97 char line[LINE_BUFFER_LEN];
256 sysadm 1.27 char buf[LINE_BUFFER_LEN];
257 sysadm 1.97 int pos;
258 sysadm 1.27
259 sysadm 1.98 if (len < 4)
260 sysadm 1.89 {
261 sysadm 1.98 len = 4;
262 sysadm 1.89 }
263 sysadm 1.98 else if (len + 2 > LINE_BUFFER_LEN)
264 sysadm 1.27 {
265 sysadm 1.98 len = LINE_BUFFER_LEN - 3;
266 sysadm 1.27 }
267 sysadm 1.97 if (percent < 0)
268 sysadm 1.27 {
269 sysadm 1.97 percent = 0;
270 sysadm 1.27 }
271 sysadm 1.97 else if (percent > 100)
272 sysadm 1.27 {
273 sysadm 1.97 percent = 100;
274 sysadm 1.27 }
275 sysadm 1.14
276 sysadm 1.97 pos = len * percent / 100;
277    
278     line[0] = ' ';
279     for (int i = 1; i <= len; i++)
280     {
281     line[i] = '-';
282     }
283     line[len + 1] = ' ';
284     line[len + 2] = '\0';
285    
286     snprintf(buf, sizeof(buf), "%*s%3d%%%*s",
287     (len - 4) / 2, "", percent, (len - 4 + 1) / 2, "");
288    
289 sysadm 1.84 moveto(4, 1);
290 sysadm 1.97 prints("%s\r\n", line);
291 sysadm 1.108 prints("|\033[46m%.*s\033[44m%s\033[m|\r\n", pos, buf, buf + pos);
292 sysadm 1.97 prints("%s\r\n", line);
293 sysadm 1.14 iflush();
294 sysadm 1.1 }
295    
296 sysadm 1.107 static int connect_timeout(struct timespec *p_ts_begin, struct timespec *p_ts_now,
297 sysadm 1.105 int total_time_ms, int *p_progress_last, int bar_len)
298     {
299 sysadm 1.107 long duration_ms;
300 sysadm 1.105 int progress;
301    
302     if (clock_gettime(CLOCK_REALTIME, p_ts_now) == -1)
303     {
304     log_error("clock_gettime() error (%d)", errno);
305     return -1;
306     }
307    
308 sysadm 1.107 duration_ms = (p_ts_now->tv_sec - p_ts_begin->tv_sec) * 1000 +
309     (p_ts_now->tv_nsec - p_ts_begin->tv_nsec) / 1000 / 1000;
310    
311     if (duration_ms >= total_time_ms)
312 sysadm 1.105 {
313 sysadm 1.107 progress_bar(100, bar_len);
314     prints("\033[1;31m连接超时!\033[m\r\n");
315     press_any_key();
316    
317     return 1;
318 sysadm 1.105 }
319 sysadm 1.107
320     progress = (int)(duration_ms * 100 / total_time_ms) + 1;
321 sysadm 1.105
322     if (progress != *p_progress_last)
323     {
324     *p_progress_last = progress;
325 sysadm 1.107 progress_bar(progress, bar_len);
326 sysadm 1.105 }
327    
328     return 0;
329     }
330    
331 sysadm 1.74 static int bbsnet_connect(int n)
332 sysadm 1.1 {
333 sysadm 1.89 int sock = -1;
334 sysadm 1.97 int ret = 0;
335 sysadm 1.89 int loop;
336     int error;
337 sysadm 1.38 int sock_connected = 0;
338 sysadm 1.107 int ssh_connected = 0;
339 sysadm 1.89 int flags_sock = -1;
340     int flags_stdin = -1;
341     int flags_stdout = -1;
342 sysadm 1.14 struct sockaddr_in sin;
343 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
344     char output_buf[LINE_BUFFER_LEN];
345     int input_buf_len = 0;
346     int output_buf_len = 0;
347     int input_buf_offset = 0;
348     int output_buf_offset = 0;
349 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
350     char output_conv[LINE_BUFFER_LEN * 2];
351     int input_conv_len = 0;
352     int output_conv_len = 0;
353     int input_conv_offset = 0;
354     int output_conv_offset = 0;
355 sysadm 1.89 iconv_t input_cd = (iconv_t)(-1);
356     iconv_t output_cd = (iconv_t)(-1);
357     char tocode[CHARSET_MAX_LEN + 20];
358 sysadm 1.82
359     #ifdef HAVE_SYS_EPOLL_H
360 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
361 sysadm 1.89 int epollfd = -1;
362 sysadm 1.82 #else
363     struct pollfd pfds[3];
364     #endif
365    
366     int nfds;
367 sysadm 1.38 int stdin_read_wait = 0;
368     int stdout_write_wait = 0;
369     int sock_read_wait = 0;
370     int sock_write_wait = 0;
371 sysadm 1.93 struct addrinfo hints, *res = NULL;
372 sysadm 1.31 int tos;
373 sysadm 1.93 char remote_addr[INET_ADDRSTRLEN];
374 sysadm 1.14 int remote_port;
375 sysadm 1.93 char local_addr[INET_ADDRSTRLEN];
376 sysadm 1.63 int local_port;
377     socklen_t sock_len;
378 sysadm 1.97 time_t t_begin, t_used;
379     struct timespec ts_begin, ts_now;
380 sysadm 1.105 int progress_last = 0;
381 sysadm 1.26 int ch;
382 sysadm 1.84 char remote_user[USERNAME_MAX_LEN + 1];
383     char remote_pass[PASSWORD_MAX_LEN + 1];
384 sysadm 1.97 ssh_session outbound_session = NULL;
385     ssh_channel outbound_channel = NULL;
386 sysadm 1.84 int ssh_process_config = 0;
387 sysadm 1.88 int ssh_log_level = SSH_LOG_NOLOG;
388 sysadm 1.14
389 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
390     {
391 sysadm 1.104 log_error("user_online_update(BBS_NET) error");
392 sysadm 1.53 }
393    
394 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
395     {
396     clearscr();
397    
398     if (!SSH_v2)
399     {
400     moveto(1, 1);
401     prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
402     press_any_key();
403     return 0;
404     }
405    
406     moveto(1, 1);
407 sysadm 1.109 prints("\033[1;32m正在准备往 %s (%s:%s) 的%s连接... \033[m\r\n",
408     bbsnet_conf[n].site_name, bbsnet_conf[n].host_name, bbsnet_conf[n].port,
409     (bbsnet_conf[n].use_ssh ? "SSH" : "Telnet"));
410 sysadm 1.84 prints("请输入用户名: ");
411     iflush();
412     if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
413     {
414     return -1;
415     }
416     if (remote_user[0] == '\0')
417     {
418     return 0;
419     }
420    
421     moveto(3, 1);
422     prints("请输入密码: ");
423     iflush();
424     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
425     {
426     return -1;
427     }
428     if (remote_pass[0] == '\0')
429     {
430     return 0;
431     }
432     }
433    
434 sysadm 1.14 clearscr();
435    
436 sysadm 1.84 moveto(1, 1);
437 sysadm 1.109 prints("\033[1;32m正在测试往 %s (%s:%s) 的%s连接,请稍候... \033[m\r\n",
438     bbsnet_conf[n].site_name, bbsnet_conf[n].host_name, bbsnet_conf[n].port,
439     (bbsnet_conf[n].use_ssh ? "SSH" : "Telnet"));
440 sysadm 1.105 prints("\033[1;32m连接进行中,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
441     progress_bar(0, PROGRESS_BAR_LEN);
442    
443     if (clock_gettime(CLOCK_REALTIME, &ts_begin) == -1)
444     {
445     log_error("clock_gettime() error (%d)", errno);
446     ret = -1;
447     goto cleanup;
448     }
449     ts_now = ts_begin;
450 sysadm 1.14
451 sysadm 1.93 memset(&hints, 0, sizeof(hints));
452     hints.ai_family = AF_INET;
453     hints.ai_socktype = SOCK_STREAM;
454     hints.ai_protocol = IPPROTO_TCP;
455 sysadm 1.14
456 sysadm 1.93 if ((ret = getaddrinfo(BBS_address, NULL, &hints, &res)) != 0)
457 sysadm 1.1 {
458 sysadm 1.104 log_error("getaddrinfo() error (%d): %s", ret, gai_strerror(ret));
459 sysadm 1.97 ret = -1;
460 sysadm 1.89 goto cleanup;
461 sysadm 1.1 }
462 sysadm 1.14
463 sysadm 1.97 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr), local_addr, sizeof(local_addr)) == NULL)
464 sysadm 1.93 {
465 sysadm 1.104 log_error("inet_ntop() error (%d)", errno);
466 sysadm 1.97 ret = -1;
467 sysadm 1.93 goto cleanup;
468     }
469     local_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
470 sysadm 1.14
471 sysadm 1.93 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
472 sysadm 1.14 if (sock < 0)
473 sysadm 1.1 {
474 sysadm 1.104 log_error("socket() error (%d)", errno);
475 sysadm 1.97 ret = -1;
476 sysadm 1.93 goto cleanup;
477     }
478    
479     if (bind(sock, res->ai_addr, res->ai_addrlen) < 0)
480     {
481 sysadm 1.104 log_error("bind(%s:%u) error (%d)", local_addr, local_port, errno);
482 sysadm 1.97 ret = -1;
483 sysadm 1.89 goto cleanup;
484 sysadm 1.1 }
485    
486 sysadm 1.93 freeaddrinfo(res);
487     res = NULL;
488    
489     memset(&hints, 0, sizeof(hints));
490     hints.ai_family = AF_INET;
491     hints.ai_flags = AI_NUMERICSERV;
492     hints.ai_socktype = SOCK_STREAM;
493     hints.ai_protocol = IPPROTO_TCP;
494 sysadm 1.14
495 sysadm 1.93 if ((ret = getaddrinfo(bbsnet_conf[n].host_name, bbsnet_conf[n].port, &hints, &res)) != 0)
496 sysadm 1.14 {
497 sysadm 1.104 log_error("getaddrinfo() error (%d): %s", ret, gai_strerror(ret));
498 sysadm 1.93 prints("\033[1;31m查找主机名失败!\033[m\r\n");
499     press_any_key();
500 sysadm 1.97 ret = -1;
501 sysadm 1.89 goto cleanup;
502 sysadm 1.14 }
503 sysadm 1.1
504 sysadm 1.97 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr), remote_addr, sizeof(remote_addr)) == NULL)
505 sysadm 1.93 {
506 sysadm 1.104 log_error("inet_ntop() error (%d)", errno);
507 sysadm 1.97 ret = -1;
508 sysadm 1.93 goto cleanup;
509     }
510     remote_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
511 sysadm 1.14
512 sysadm 1.39 // Set socket as non-blocking
513 sysadm 1.89 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
514     {
515 sysadm 1.104 log_error("fcntl(F_GETFL) error (%d)", errno);
516 sysadm 1.97 ret = -1;
517 sysadm 1.89 goto cleanup;
518     }
519     if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
520     {
521 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
522 sysadm 1.97 ret = -1;
523 sysadm 1.89 goto cleanup;
524     }
525 sysadm 1.39
526     // Set STDIN/STDOUT as non-blocking
527 sysadm 1.89 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
528     {
529 sysadm 1.104 log_error("fcntl(F_GETFL) error (%d)", errno);
530 sysadm 1.97 ret = -1;
531 sysadm 1.89 goto cleanup;
532     }
533     if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
534     {
535 sysadm 1.104 log_error("fcntl(F_GETFL) error (%d)", errno);
536 sysadm 1.97 ret = -1;
537 sysadm 1.89 goto cleanup;
538     }
539     if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
540     {
541 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
542 sysadm 1.97 ret = -1;
543 sysadm 1.89 goto cleanup;
544     }
545     if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
546     {
547 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
548 sysadm 1.97 ret = -1;
549 sysadm 1.89 goto cleanup;
550     }
551 sysadm 1.39
552 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
553 sysadm 1.38 epollfd = epoll_create1(0);
554     if (epollfd < 0)
555     {
556 sysadm 1.104 log_error("epoll_create1() error (%d)", errno);
557 sysadm 1.97 ret = -1;
558 sysadm 1.89 goto cleanup;
559 sysadm 1.38 }
560    
561 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
562 sysadm 1.38 ev.data.fd = sock;
563     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
564     {
565 sysadm 1.104 log_error("epoll_ctl(socket) error (%d)", errno);
566 sysadm 1.97 ret = -1;
567 sysadm 1.39 goto cleanup;
568 sysadm 1.38 }
569    
570 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
571 sysadm 1.38 ev.data.fd = STDIN_FILENO;
572     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
573     {
574 sysadm 1.104 log_error("epoll_ctl(STDIN_FILENO) error (%d)", errno);
575 sysadm 1.97 ret = -1;
576 sysadm 1.39 goto cleanup;
577 sysadm 1.38 }
578 sysadm 1.82 #endif
579 sysadm 1.38
580 sysadm 1.107 while (!SYS_server_exit &&
581     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
582 sysadm 1.29 {
583 sysadm 1.97 if ((ret = connect(sock, res->ai_addr, res->ai_addrlen)) == 0)
584     {
585     sock_connected = 1;
586     break;
587     }
588     else if (ret < 0)
589 sysadm 1.29 {
590 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
591     {
592     // Use select / epoll to check writability of the socket,
593     // then use getsockopt to check the status of the socket.
594     // See man connect(2)
595     break;
596     }
597     else if (errno == EINTR)
598     {
599     }
600     else
601     {
602 sysadm 1.104 log_error("connect(socket) error (%d)", errno);
603 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
604 sysadm 1.38 press_any_key();
605 sysadm 1.97 ret = -1;
606 sysadm 1.39 goto cleanup;
607 sysadm 1.38 }
608 sysadm 1.29 }
609     }
610    
611 sysadm 1.107 while (!SYS_server_exit && !sock_connected &&
612     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
613 sysadm 1.1 {
614 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
615 sysadm 1.97 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
616 sysadm 1.82 ret = nfds;
617     #else
618     pfds[0].fd = sock;
619     pfds[0].events = POLLOUT;
620     pfds[1].fd = STDIN_FILENO;
621     pfds[1].events = POLLIN;
622     nfds = 2;
623 sysadm 1.97 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
624 sysadm 1.82 #endif
625 sysadm 1.29
626 sysadm 1.82 if (ret < 0)
627 sysadm 1.20 {
628 sysadm 1.29 if (errno != EINTR)
629     {
630 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
631 sysadm 1.104 log_error("epoll_wait() error (%d)", errno);
632 sysadm 1.82 #else
633 sysadm 1.104 log_error("poll() error (%d)", errno);
634 sysadm 1.82 #endif
635 sysadm 1.39 break;
636 sysadm 1.29 }
637 sysadm 1.20 }
638 sysadm 1.82 else if (ret == 0) // timeout
639 sysadm 1.38 {
640     }
641     else // ret > 0
642 sysadm 1.14 {
643 sysadm 1.38 for (int i = 0; i < nfds; i++)
644 sysadm 1.29 {
645 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
646 sysadm 1.38 if (events[i].data.fd == sock)
647 sysadm 1.82 #else
648     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
649     #endif
650 sysadm 1.38 {
651 sysadm 1.89 socklen_t len = sizeof(error);
652     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
653 sysadm 1.38 {
654 sysadm 1.104 log_error("getsockopt() error (%d) !", errno);
655 sysadm 1.97 ret = -1;
656 sysadm 1.39 goto cleanup;
657 sysadm 1.38 }
658     if (error == 0)
659     {
660     sock_connected = 1;
661 sysadm 1.97 break;
662 sysadm 1.38 }
663     }
664 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
665 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
666 sysadm 1.82 #else
667     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
668     #endif
669 sysadm 1.38 {
670 sysadm 1.84 do
671     {
672     ch = igetch(0);
673     } while (ch == 0);
674 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
675 sysadm 1.38 {
676 sysadm 1.97 ret = 0;
677 sysadm 1.39 goto cleanup;
678 sysadm 1.38 }
679     }
680 sysadm 1.29 }
681 sysadm 1.14 }
682 sysadm 1.38 }
683     if (!sock_connected)
684 sysadm 1.12 {
685 sysadm 1.97 ret = -1;
686 sysadm 1.39 goto cleanup;
687 sysadm 1.12 }
688 sysadm 1.29
689 sysadm 1.31 tos = IPTOS_LOWDELAY;
690     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
691     {
692 sysadm 1.104 log_error("setsockopt IP_TOS=%d error (%d)", tos, errno);
693 sysadm 1.31 }
694 sysadm 1.14
695 sysadm 1.63 sock_len = sizeof(sin);
696     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
697     {
698     log_error("getsockname() error: %d", errno);
699 sysadm 1.97 ret = -1;
700 sysadm 1.63 goto cleanup;
701     }
702    
703 sysadm 1.97 if (inet_ntop(AF_INET, &(sin.sin_addr), local_addr, sizeof(local_addr)) == NULL)
704     {
705 sysadm 1.104 log_error("inet_ntop() error (%d)", errno);
706 sysadm 1.97 ret = -1;
707     goto cleanup;
708     }
709 sysadm 1.63 local_port = ntohs(sin.sin_port);
710    
711 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
712     {
713 sysadm 1.97 outbound_session = ssh_new();
714     if (outbound_session == NULL)
715 sysadm 1.84 {
716 sysadm 1.104 log_error("ssh_new() error");
717 sysadm 1.97 ret = -1;
718 sysadm 1.84 goto cleanup;
719     }
720    
721 sysadm 1.97 if (ssh_options_set(outbound_session, SSH_OPTIONS_FD, &sock) < 0 ||
722     ssh_options_set(outbound_session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
723     ssh_options_set(outbound_session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
724     ssh_options_set(outbound_session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
725     ssh_options_set(outbound_session, SSH_OPTIONS_USER, remote_user) < 0 ||
726     ssh_options_set(outbound_session, SSH_OPTIONS_HOSTKEYS, "+ssh-ed25519,ecdsa-sha2-nistp256,ssh-rsa") < 0 ||
727     ssh_options_set(outbound_session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
728 sysadm 1.84 {
729 sysadm 1.104 log_error("Error setting SSH options: %s", ssh_get_error(outbound_session));
730 sysadm 1.97 ret = -1;
731 sysadm 1.84 goto cleanup;
732     }
733    
734 sysadm 1.97 ssh_set_blocking(outbound_session, 0);
735 sysadm 1.85
736 sysadm 1.107 ssh_connected = 0;
737     while (!SYS_server_exit &&
738     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
739 sysadm 1.84 {
740 sysadm 1.97 ret = ssh_connect(outbound_session);
741 sysadm 1.84 if (ret == SSH_OK)
742     {
743 sysadm 1.107 ssh_connected = 1;
744 sysadm 1.84 break;
745     }
746 sysadm 1.90 else if (ret == SSH_AGAIN)
747     {
748 sysadm 1.104 // log_debug("ssh_connect() error: SSH_AGAIN");
749 sysadm 1.90 }
750     else // if (ret == SSH_ERROR)
751 sysadm 1.84 {
752 sysadm 1.104 log_error("ssh_connect() error: SSH_ERROR");
753 sysadm 1.97 ret = -1;
754 sysadm 1.84 goto cleanup;
755     }
756     }
757 sysadm 1.107 if (!ssh_connected)
758 sysadm 1.90 {
759 sysadm 1.97 ret = -1;
760 sysadm 1.90 goto cleanup;
761     }
762 sysadm 1.84
763 sysadm 1.97 ret = ssh_session_is_known_server(outbound_session);
764 sysadm 1.85 switch (ret)
765     {
766     case SSH_KNOWN_HOSTS_NOT_FOUND:
767     case SSH_KNOWN_HOSTS_UNKNOWN:
768 sysadm 1.97 if (ssh_session_update_known_hosts(outbound_session) != SSH_OK)
769 sysadm 1.85 {
770 sysadm 1.104 log_error("ssh_session_update_known_hosts(%s) error", bbsnet_conf[n].host_name);
771 sysadm 1.90 prints("\033[1;31m无法添加服务器证书\033[m\r\n");
772 sysadm 1.85 press_any_key();
773 sysadm 1.97 ret = -1;
774 sysadm 1.85 goto cleanup;
775     }
776 sysadm 1.104 log_common("SSH key of (%s) is added into %s", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
777 sysadm 1.85 case SSH_KNOWN_HOSTS_OK:
778     break;
779     case SSH_KNOWN_HOSTS_CHANGED:
780     case SSH_KNOWN_HOSTS_OTHER:
781 sysadm 1.104 log_error("ssh_session_is_known_server(%s) error: %d", bbsnet_conf[n].host_name, ret);
782 sysadm 1.90 prints("\033[1;31m服务器证书已变更\033[m\r\n");
783 sysadm 1.85 press_any_key();
784 sysadm 1.97 ret = -1;
785 sysadm 1.85 goto cleanup;
786     }
787 sysadm 1.84
788 sysadm 1.107 ssh_connected = 0;
789     while (!SYS_server_exit &&
790     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
791 sysadm 1.84 {
792 sysadm 1.97 ret = ssh_userauth_password(outbound_session, NULL, remote_pass);
793 sysadm 1.84 if (ret == SSH_AUTH_SUCCESS)
794     {
795 sysadm 1.107 ssh_connected = 1;
796 sysadm 1.84 break;
797     }
798     else if (ret == SSH_AUTH_AGAIN)
799     {
800 sysadm 1.104 // log_debug("ssh_userauth_password() error: SSH_AUTH_AGAIN");
801 sysadm 1.84 }
802     else if (ret == SSH_AUTH_ERROR)
803     {
804 sysadm 1.104 log_error("ssh_userauth_password() error: SSH_AUTH_ERROR");
805 sysadm 1.97 ret = -1;
806 sysadm 1.84 goto cleanup;
807     }
808     else // if (ret == SSH_AUTH_DENIED)
809     {
810 sysadm 1.105 log_debug("ssh_userauth_password() error: SSH_AUTH_DENIED");
811 sysadm 1.84 prints("\033[1;31m身份验证失败!\033[m\r\n");
812 sysadm 1.90 press_any_key();
813 sysadm 1.105 ret = 0;
814     goto cleanup;
815     }
816 sysadm 1.84 }
817 sysadm 1.107 if (!ssh_connected)
818 sysadm 1.90 {
819 sysadm 1.97 ret = -1;
820 sysadm 1.90 goto cleanup;
821     }
822 sysadm 1.84
823 sysadm 1.97 outbound_channel = ssh_channel_new(outbound_session);
824     if (outbound_channel == NULL)
825 sysadm 1.84 {
826 sysadm 1.104 log_error("ssh_channel_new() error");
827 sysadm 1.97 ret = -1;
828 sysadm 1.84 goto cleanup;
829     }
830    
831 sysadm 1.107 ssh_connected = 0;
832     while (!SYS_server_exit &&
833     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
834 sysadm 1.84 {
835 sysadm 1.97 ret = ssh_channel_open_session(outbound_channel);
836 sysadm 1.84 if (ret == SSH_OK)
837     {
838 sysadm 1.107 ssh_connected = 1;
839 sysadm 1.84 break;
840     }
841 sysadm 1.90 else if (ret == SSH_AGAIN)
842     {
843 sysadm 1.104 // log_debug("ssh_channel_open_session() error: SSH_AGAIN");
844 sysadm 1.90 }
845     else // if (ret == SSH_ERROR)
846 sysadm 1.84 {
847 sysadm 1.104 log_error("ssh_channel_open_session() error: SSH_ERROR");
848 sysadm 1.97 ret = -1;
849 sysadm 1.84 goto cleanup;
850     }
851     }
852 sysadm 1.107 if (!ssh_connected)
853 sysadm 1.90 {
854 sysadm 1.97 ret = -1;
855 sysadm 1.90 goto cleanup;
856     }
857 sysadm 1.84
858 sysadm 1.107 ssh_connected = 0;
859     while (!SYS_server_exit &&
860     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
861 sysadm 1.84 {
862 sysadm 1.97 ret = ssh_channel_request_pty(outbound_channel);
863 sysadm 1.84 if (ret == SSH_OK)
864     {
865 sysadm 1.107 ssh_connected = 1;
866 sysadm 1.84 break;
867     }
868 sysadm 1.90 else if (ret == SSH_AGAIN)
869     {
870 sysadm 1.104 // log_debug("ssh_channel_request_pty() error: SSH_AGAIN");
871 sysadm 1.90 }
872     else // if (ret == SSH_ERROR)
873 sysadm 1.84 {
874 sysadm 1.104 log_error("ssh_channel_request_pty() error: SSH_ERROR");
875 sysadm 1.97 ret = -1;
876 sysadm 1.84 goto cleanup;
877     }
878     }
879 sysadm 1.107 if (!ssh_connected)
880 sysadm 1.90 {
881 sysadm 1.97 ret = -1;
882 sysadm 1.90 goto cleanup;
883     }
884 sysadm 1.84
885 sysadm 1.107 ssh_connected = 0;
886     while (!SYS_server_exit &&
887     !connect_timeout(&ts_begin, &ts_now, REMOTE_CONNECT_TIMEOUT * 1000, &progress_last, PROGRESS_BAR_LEN))
888 sysadm 1.84 {
889 sysadm 1.97 ret = ssh_channel_request_shell(outbound_channel);
890 sysadm 1.84 if (ret == SSH_OK)
891     {
892 sysadm 1.107 ssh_connected = 1;
893 sysadm 1.84 break;
894     }
895 sysadm 1.90 else if (ret == SSH_AGAIN)
896     {
897 sysadm 1.104 // log_debug("ssh_channel_request_shell() error: SSH_AGAIN");
898 sysadm 1.90 }
899     else // if (ret == SSH_ERROR)
900 sysadm 1.84 {
901 sysadm 1.104 log_error("ssh_channel_request_shell() error: SSH_ERROR");
902 sysadm 1.97 ret = -1;
903 sysadm 1.84 goto cleanup;
904     }
905     }
906 sysadm 1.107 if (!ssh_connected)
907 sysadm 1.89 {
908 sysadm 1.97 ret = -1;
909 sysadm 1.89 goto cleanup;
910     }
911 sysadm 1.84 }
912    
913 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
914 sysadm 1.33 iflush();
915 sysadm 1.104 log_common("BBSNET connect to %s:%d from %s:%d by [%s]",
916 sysadm 1.63 remote_addr, remote_port, local_addr, local_port, BBS_username);
917 sysadm 1.14
918 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
919     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
920 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
921 sysadm 1.60 if (input_cd == (iconv_t)(-1))
922     {
923 sysadm 1.104 log_error("iconv_open(%s->%s) error: %d", stdio_charset, tocode, errno);
924 sysadm 1.97 ret = -1;
925 sysadm 1.60 goto cleanup;
926     }
927 sysadm 1.68
928 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
929     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
930 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
931 sysadm 1.67 if (output_cd == (iconv_t)(-1))
932 sysadm 1.60 {
933 sysadm 1.104 log_error("iconv_open(%s->%s) error: %d", bbsnet_conf[n].charset, tocode, errno);
934 sysadm 1.97 ret = -1;
935 sysadm 1.60 goto cleanup;
936     }
937    
938 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
939 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
940     ev.data.fd = sock;
941     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
942     {
943 sysadm 1.104 log_error("epoll_ctl(socket) error (%d)", errno);
944 sysadm 1.97 ret = -1;
945 sysadm 1.39 goto cleanup;
946 sysadm 1.38 }
947    
948 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
949 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
950     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
951     {
952 sysadm 1.104 log_error("epoll_ctl(STDOUT_FILENO) error (%d)", errno);
953 sysadm 1.97 ret = -1;
954 sysadm 1.39 goto cleanup;
955 sysadm 1.38 }
956 sysadm 1.82 #endif
957 sysadm 1.38
958 sysadm 1.97 BBS_last_access_tm = t_begin = time(NULL);
959 sysadm 1.14 loop = 1;
960    
961 sysadm 1.26 while (loop && !SYS_server_exit)
962 sysadm 1.12 {
963 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
964     {
965 sysadm 1.104 log_debug("SSH channel is closed");
966 sysadm 1.47 loop = 0;
967     break;
968     }
969    
970 sysadm 1.97 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(outbound_channel))
971 sysadm 1.84 {
972 sysadm 1.104 log_debug("Outbound channel is closed");
973 sysadm 1.84 loop = 0;
974     break;
975     }
976    
977 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
978 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
979 sysadm 1.82 ret = nfds;
980     #else
981     pfds[0].fd = STDIN_FILENO;
982     pfds[0].events = POLLIN;
983     pfds[1].fd = sock;
984     pfds[1].events = POLLIN | POLLOUT;
985     pfds[2].fd = STDOUT_FILENO;
986     pfds[2].events = POLLOUT;
987     nfds = 3;
988     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
989     #endif
990 sysadm 1.33
991 sysadm 1.82 if (ret < 0)
992 sysadm 1.14 {
993 sysadm 1.38 if (errno != EINTR)
994 sysadm 1.14 {
995 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
996 sysadm 1.104 log_error("epoll_wait() error (%d)", errno);
997 sysadm 1.82 #else
998 sysadm 1.104 log_error("poll() error (%d)", errno);
999 sysadm 1.82 #endif
1000 sysadm 1.38 break;
1001 sysadm 1.14 }
1002 sysadm 1.38 continue;
1003 sysadm 1.14 }
1004 sysadm 1.82 else if (ret == 0) // timeout
1005 sysadm 1.1 {
1006 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1007 sysadm 1.28 {
1008 sysadm 1.104 log_debug("User input timeout");
1009 sysadm 1.38 break;
1010 sysadm 1.28 }
1011 sysadm 1.1 }
1012 sysadm 1.38
1013     for (int i = 0; i < nfds; i++)
1014 sysadm 1.1 {
1015 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1016 sysadm 1.96 if (events[i].events & (EPOLLHUP | EPOLLERR))
1017 sysadm 1.94 #else
1018 sysadm 1.96 if (pfds[i].revents & (POLLHUP | POLLERR))
1019 sysadm 1.94 #endif
1020     {
1021     #ifdef HAVE_SYS_EPOLL_H
1022 sysadm 1.104 log_debug("FD (%d) error events (%d)", events[i].data.fd, events[i].events);
1023 sysadm 1.94 #else
1024 sysadm 1.104 log_debug("FD (%d) error events (%d)", pfds[i].fd, pfds[i].revents);
1025 sysadm 1.94 #endif
1026     loop = 0;
1027     break;
1028     }
1029    
1030     #ifdef HAVE_SYS_EPOLL_H
1031     if (events[i].data.fd == STDIN_FILENO && (events[i].events & EPOLLIN))
1032 sysadm 1.82 #else
1033     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
1034     #endif
1035 sysadm 1.14 {
1036 sysadm 1.38 stdin_read_wait = 1;
1037 sysadm 1.59 }
1038    
1039 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1040 sysadm 1.59 if (events[i].data.fd == sock)
1041 sysadm 1.82 #else
1042     if (pfds[i].fd == sock)
1043     #endif
1044 sysadm 1.59 {
1045 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1046 sysadm 1.59 if (events[i].events & EPOLLIN)
1047 sysadm 1.82 #else
1048     if (pfds[i].revents & POLLIN)
1049     #endif
1050 sysadm 1.59 {
1051     sock_read_wait = 1;
1052     }
1053 sysadm 1.82
1054     #ifdef HAVE_SYS_EPOLL_H
1055 sysadm 1.59 if (events[i].events & EPOLLOUT)
1056 sysadm 1.82 #else
1057     if (pfds[i].revents & POLLOUT)
1058     #endif
1059 sysadm 1.59 {
1060     sock_write_wait = 1;
1061     }
1062     }
1063    
1064 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1065 sysadm 1.94 if (events[i].data.fd == STDOUT_FILENO && (events[i].events & EPOLLOUT))
1066 sysadm 1.82 #else
1067     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
1068 sysadm 1.84 #endif
1069 sysadm 1.59 {
1070     stdout_write_wait = 1;
1071     }
1072     }
1073    
1074     if (stdin_read_wait)
1075     {
1076     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
1077     {
1078     if (SSH_v2)
1079 sysadm 1.33 {
1080 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
1081     if (ret == SSH_ERROR)
1082 sysadm 1.47 {
1083 sysadm 1.104 log_debug("ssh_channel_read_nonblocking() error: %s", ssh_get_error(SSH_session));
1084 sysadm 1.59 loop = 0;
1085     break;
1086 sysadm 1.47 }
1087 sysadm 1.59 else if (ret == SSH_EOF)
1088 sysadm 1.47 {
1089 sysadm 1.59 stdin_read_wait = 0;
1090     loop = 0;
1091     break;
1092 sysadm 1.47 }
1093 sysadm 1.59 else if (ret == 0)
1094 sysadm 1.33 {
1095 sysadm 1.72 // Send NO-OP to remote server
1096     input_buf[input_buf_len] = '\0';
1097     input_buf_len++;
1098 sysadm 1.97
1099 sysadm 1.73 BBS_last_access_tm = time(NULL);
1100 sysadm 1.59 stdin_read_wait = 0;
1101     break; // Check whether channel is still open
1102 sysadm 1.38 }
1103 sysadm 1.59 }
1104     else
1105     {
1106     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
1107     }
1108     if (ret < 0)
1109     {
1110     if (errno == EAGAIN || errno == EWOULDBLOCK)
1111 sysadm 1.38 {
1112     stdin_read_wait = 0;
1113     break;
1114     }
1115 sysadm 1.59 else if (errno == EINTR)
1116     {
1117     continue;
1118     }
1119 sysadm 1.38 else
1120     {
1121 sysadm 1.104 log_error("read(STDIN) error (%d)", errno);
1122 sysadm 1.59 loop = 0;
1123     break;
1124     }
1125     }
1126     else if (ret == 0) // broken pipe
1127     {
1128 sysadm 1.104 log_debug("read(STDIN) EOF");
1129 sysadm 1.59 stdin_read_wait = 0;
1130     loop = 0;
1131     break;
1132     }
1133     else
1134     {
1135     input_buf_len += ret;
1136     BBS_last_access_tm = time(NULL);
1137 sysadm 1.58
1138 sysadm 1.59 // Refresh current action while user input
1139     if (user_online_update("BBS_NET") < 0)
1140     {
1141 sysadm 1.104 log_error("user_online_update(BBS_NET) error");
1142 sysadm 1.59 }
1143 sysadm 1.58
1144 sysadm 1.59 continue;
1145 sysadm 1.33 }
1146 sysadm 1.36 }
1147 sysadm 1.59 }
1148 sysadm 1.29
1149 sysadm 1.59 if (sock_write_wait)
1150     {
1151 sysadm 1.60 if (input_buf_offset < input_buf_len)
1152 sysadm 1.36 {
1153 sysadm 1.72 // For debug
1154     #ifdef _DEBUG
1155     for (int j = input_buf_offset; j < input_buf_len; j++)
1156     {
1157 sysadm 1.106 log_debug("input: <--[%u]", (unsigned char)(input_buf[j]));
1158 sysadm 1.72 }
1159     #endif
1160    
1161 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
1162 sysadm 1.60 if (ret < 0)
1163     {
1164 sysadm 1.104 log_error("io_buf_conv(input, %d, %d, %d) error", input_buf_len, input_buf_offset, input_conv_len);
1165 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
1166 sysadm 1.60 }
1167 sysadm 1.72
1168     // For debug
1169     #ifdef _DEBUG
1170     for (int j = input_conv_offset; j < input_conv_len; j++)
1171     {
1172 sysadm 1.106 log_debug("input_conv: <--[%u]", (unsigned char)(input_conv[j]));
1173 sysadm 1.72 }
1174     #endif
1175 sysadm 1.60 }
1176    
1177     while (input_conv_offset < input_conv_len && !SYS_server_exit)
1178     {
1179 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1180     {
1181 sysadm 1.97 ret = ssh_channel_write(outbound_channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
1182 sysadm 1.84 if (ret == SSH_ERROR)
1183     {
1184 sysadm 1.104 log_debug("ssh_channel_write() error: %s", ssh_get_error(outbound_session));
1185 sysadm 1.84 loop = 0;
1186     break;
1187     }
1188     }
1189     else
1190     {
1191     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
1192     }
1193 sysadm 1.59 if (ret < 0)
1194 sysadm 1.36 {
1195 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1196 sysadm 1.36 {
1197 sysadm 1.59 sock_write_wait = 0;
1198     break;
1199 sysadm 1.38 }
1200 sysadm 1.59 else if (errno == EINTR)
1201 sysadm 1.38 {
1202 sysadm 1.59 continue;
1203     }
1204     else
1205     {
1206 sysadm 1.104 log_debug("write(socket) error (%d)", errno);
1207 sysadm 1.36 loop = 0;
1208 sysadm 1.38 break;
1209     }
1210 sysadm 1.59 }
1211     else if (ret == 0) // broken pipe
1212     {
1213 sysadm 1.104 log_debug("write(socket) EOF");
1214 sysadm 1.59 sock_write_wait = 0;
1215     loop = 0;
1216     break;
1217     }
1218     else
1219     {
1220 sysadm 1.60 input_conv_offset += ret;
1221     if (input_conv_offset >= input_conv_len) // Output buffer complete
1222 sysadm 1.38 {
1223 sysadm 1.60 input_conv_offset = 0;
1224     input_conv_len = 0;
1225 sysadm 1.59 break;
1226 sysadm 1.36 }
1227 sysadm 1.59 continue;
1228 sysadm 1.36 }
1229 sysadm 1.14 }
1230 sysadm 1.59 }
1231 sysadm 1.36
1232 sysadm 1.59 if (sock_read_wait)
1233     {
1234     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1235 sysadm 1.14 {
1236 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1237     {
1238 sysadm 1.97 ret = ssh_channel_read_nonblocking(outbound_channel, output_buf + output_buf_len,
1239 sysadm 1.84 (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1240     if (ret == SSH_ERROR)
1241     {
1242 sysadm 1.104 log_debug("ssh_channel_read_nonblocking() error: %s", ssh_get_error(outbound_session));
1243 sysadm 1.84 loop = 0;
1244     break;
1245     }
1246     else if (ret == SSH_EOF)
1247     {
1248     sock_read_wait = 0;
1249     loop = 0;
1250     break;
1251     }
1252     else if (ret == 0)
1253     {
1254     sock_read_wait = 0;
1255     break;
1256     }
1257     }
1258     else
1259     {
1260     ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1261     }
1262 sysadm 1.59 if (ret < 0)
1263 sysadm 1.14 {
1264 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1265 sysadm 1.38 {
1266 sysadm 1.59 sock_read_wait = 0;
1267     break;
1268 sysadm 1.38 }
1269 sysadm 1.59 else if (errno == EINTR)
1270 sysadm 1.33 {
1271 sysadm 1.59 continue;
1272 sysadm 1.38 }
1273     else
1274     {
1275 sysadm 1.104 log_debug("read(socket) error (%d)", errno);
1276 sysadm 1.59 loop = 0;
1277     break;
1278 sysadm 1.33 }
1279     }
1280 sysadm 1.59 else if (ret == 0) // broken pipe
1281     {
1282 sysadm 1.104 log_debug("read(socket) EOF");
1283 sysadm 1.59 sock_read_wait = 0;
1284     loop = 0;
1285     break;
1286     }
1287     else
1288     {
1289     output_buf_len += ret;
1290     continue;
1291     }
1292 sysadm 1.36 }
1293 sysadm 1.59 }
1294 sysadm 1.36
1295 sysadm 1.59 if (stdout_write_wait)
1296     {
1297 sysadm 1.60 if (output_buf_offset < output_buf_len)
1298     {
1299 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1300 sysadm 1.60 if (ret < 0)
1301     {
1302 sysadm 1.104 log_error("io_buf_conv(output, %d, %d, %d) error", output_buf_len, output_buf_offset, output_conv_len);
1303 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
1304 sysadm 1.60 }
1305     }
1306    
1307     while (output_conv_offset < output_conv_len && !SYS_server_exit)
1308 sysadm 1.36 {
1309 sysadm 1.59 if (SSH_v2)
1310 sysadm 1.36 {
1311 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1312 sysadm 1.59 if (ret == SSH_ERROR)
1313 sysadm 1.47 {
1314 sysadm 1.104 log_debug("ssh_channel_write() error: %s", ssh_get_error(SSH_session));
1315 sysadm 1.59 loop = 0;
1316     break;
1317 sysadm 1.47 }
1318 sysadm 1.59 }
1319     else
1320     {
1321 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1322 sysadm 1.59 }
1323     if (ret < 0)
1324     {
1325     if (errno == EAGAIN || errno == EWOULDBLOCK)
1326 sysadm 1.47 {
1327 sysadm 1.59 stdout_write_wait = 0;
1328     break;
1329 sysadm 1.47 }
1330 sysadm 1.59 else if (errno == EINTR)
1331 sysadm 1.38 {
1332 sysadm 1.59 continue;
1333 sysadm 1.38 }
1334 sysadm 1.59 else
1335 sysadm 1.33 {
1336 sysadm 1.104 log_debug("write(STDOUT) error (%d)", errno);
1337 sysadm 1.36 loop = 0;
1338 sysadm 1.38 break;
1339     }
1340 sysadm 1.59 }
1341     else if (ret == 0) // broken pipe
1342     {
1343 sysadm 1.104 log_debug("write(STDOUT) EOF");
1344 sysadm 1.59 stdout_write_wait = 0;
1345     loop = 0;
1346     break;
1347     }
1348     else
1349     {
1350 sysadm 1.60 output_conv_offset += ret;
1351     if (output_conv_offset >= output_conv_len) // Output buffer complete
1352 sysadm 1.38 {
1353 sysadm 1.60 output_conv_offset = 0;
1354     output_conv_len = 0;
1355 sysadm 1.59 break;
1356 sysadm 1.36 }
1357 sysadm 1.59 continue;
1358 sysadm 1.36 }
1359 sysadm 1.14 }
1360 sysadm 1.1 }
1361     }
1362    
1363 sysadm 1.97 ret = 1; // Normal disconnect
1364     BBS_last_access_tm = time(NULL);
1365     t_used = BBS_last_access_tm - t_begin;
1366 sysadm 1.104 log_common("BBSNET disconnect, %ld days %ld hours %ld minutes %ld seconds used",
1367 sysadm 1.97 t_used / 86400, t_used % 86400 / 3600, t_used % 3600 / 60, t_used % 60);
1368    
1369 sysadm 1.89 cleanup:
1370 sysadm 1.97 // Clear sensitive data
1371     memset(remote_pass, 0, sizeof(remote_pass));
1372     memset(remote_user, 0, sizeof(remote_user));
1373    
1374 sysadm 1.107 if (input_cd != (iconv_t)(-1) && iconv_close(input_cd) < 0)
1375 sysadm 1.89 {
1376 sysadm 1.107 log_error("iconv_close(input) error (%d)", errno);
1377 sysadm 1.89 }
1378 sysadm 1.107 if (output_cd != (iconv_t)(-1) && iconv_close(output_cd) < 0)
1379 sysadm 1.89 {
1380 sysadm 1.107 log_error("iconv_close(output) error (%d)", errno);
1381 sysadm 1.89 }
1382 sysadm 1.60
1383 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1384 sysadm 1.89 if (epollfd != -1 && close(epollfd) < 0)
1385 sysadm 1.39 {
1386 sysadm 1.104 log_error("close(epoll) error (%d)");
1387 sysadm 1.39 }
1388 sysadm 1.82 #endif
1389 sysadm 1.39
1390 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1391     {
1392 sysadm 1.97 if (outbound_channel != NULL)
1393 sysadm 1.89 {
1394 sysadm 1.97 ssh_channel_send_eof(outbound_channel);
1395     ssh_channel_close(outbound_channel);
1396     ssh_channel_free(outbound_channel);
1397 sysadm 1.89 }
1398 sysadm 1.97 if (outbound_session != NULL)
1399 sysadm 1.89 {
1400 sysadm 1.97 ssh_disconnect(outbound_session);
1401     ssh_free(outbound_session);
1402 sysadm 1.89 }
1403 sysadm 1.84 }
1404    
1405 sysadm 1.36 // Restore STDIN/STDOUT flags
1406 sysadm 1.90 if (flags_stdin != -1 && fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1407 sysadm 1.89 {
1408 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
1409 sysadm 1.89 }
1410     if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1411     {
1412 sysadm 1.104 log_error("fcntl(F_SETFL) error (%d)", errno);
1413 sysadm 1.89 }
1414 sysadm 1.36
1415 sysadm 1.107 if (sock != -1)
1416 sysadm 1.14 {
1417 sysadm 1.107 close(sock);
1418 sysadm 1.14 }
1419 sysadm 1.1
1420 sysadm 1.93 if (res)
1421     {
1422     freeaddrinfo(res);
1423     }
1424    
1425 sysadm 1.97 return ret;
1426 sysadm 1.1 }
1427    
1428 sysadm 1.74 static int bbsnet_refresh()
1429 sysadm 1.1 {
1430 sysadm 1.14 clearscr();
1431 sysadm 1.84
1432     moveto(1, 1);
1433     prints(" ------------------------------------------------------------------------------ ");
1434 sysadm 1.20 for (int i = 2; i < 19; i++)
1435 sysadm 1.14 {
1436 sysadm 1.84 moveto(i, 1);
1437 sysadm 1.23 prints("|");
1438 sysadm 1.84 moveto(i, 80);
1439 sysadm 1.23 prints("|");
1440 sysadm 1.14 }
1441 sysadm 1.84 moveto(19, 1);
1442     prints("|------------------------------------------------------------------------------|");
1443     moveto(22, 1);
1444     prints(" ------------------------------------------------------------------------------ ");
1445     moveto(23, 1);
1446     prints(" [\033[1;32mCtrl+C\033[m]退出");
1447 sysadm 1.13
1448 sysadm 1.14 iflush();
1449 sysadm 1.1
1450 sysadm 1.14 return 0;
1451 sysadm 1.1 }
1452    
1453 sysadm 1.74 static int bbsnet_selchange()
1454 sysadm 1.1 {
1455 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
1456    
1457 sysadm 1.84 moveto(20, 1);
1458 sysadm 1.14 clrtoeol();
1459 sysadm 1.87 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1460     bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1461     bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1462     (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1463 sysadm 1.84 moveto(20, 80);
1464 sysadm 1.23 prints("|");
1465 sysadm 1.84 moveto(21, 1);
1466 sysadm 1.14 clrtoeol();
1467 sysadm 1.93 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5s\033[m 编码: \033[1;33m%s\033[m",
1468 sysadm 1.87 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1469 sysadm 1.84 moveto(21, 80);
1470 sysadm 1.23 prints("|");
1471 sysadm 1.14 iflush();
1472 sysadm 1.1
1473 sysadm 1.14 return 0;
1474 sysadm 1.1 }
1475    
1476 sysadm 1.83 int bbs_net()
1477 sysadm 1.1 {
1478 sysadm 1.98 int ch;
1479 sysadm 1.1
1480 sysadm 1.89 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1481     {
1482     clearscr();
1483     moveto(1, 1);
1484     prints("加载穿梭配置失败!");
1485     press_any_key();
1486     return -1;
1487     }
1488 sysadm 1.1
1489 sysadm 1.14 bbsnet_refresh();
1490 sysadm 1.41 display_menu(&bbsnet_menu);
1491 sysadm 1.43 bbsnet_selchange();
1492 sysadm 1.14
1493 sysadm 1.26 while (!SYS_server_exit)
1494 sysadm 1.1 {
1495 sysadm 1.39 ch = igetch(100);
1496 sysadm 1.52
1497 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1498     {
1499     BBS_last_access_tm = time(NULL);
1500     }
1501 sysadm 1.64
1502 sysadm 1.14 switch (ch)
1503     {
1504 sysadm 1.47 case KEY_NULL: // broken pipe
1505 sysadm 1.104 log_debug("KEY_NULL");
1506 sysadm 1.40 goto cleanup;
1507 sysadm 1.14 case KEY_TIMEOUT:
1508 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1509 sysadm 1.14 {
1510 sysadm 1.104 log_debug("User input timeout");
1511 sysadm 1.40 goto cleanup;
1512 sysadm 1.14 }
1513 sysadm 1.29 continue;
1514 sysadm 1.64 case KEY_ESC:
1515     case Ctrl('C'): // user cancel
1516     goto cleanup;
1517 sysadm 1.14 case CR:
1518 sysadm 1.98 if (bbsnet_connect(bbsnet_menu.menu_item_pos[0]) < 0)
1519     {
1520 sysadm 1.104 log_debug("bbsnet_connect() error");
1521 sysadm 1.98 }
1522 sysadm 1.84 // Force cleanup anything remaining in the output buffer
1523     clearscr();
1524     iflush();
1525     // Clear screen and redraw menu
1526 sysadm 1.14 bbsnet_refresh();
1527 sysadm 1.41 display_menu(&bbsnet_menu);
1528 sysadm 1.43 bbsnet_selchange();
1529 sysadm 1.14 break;
1530     case KEY_UP:
1531 sysadm 1.98 for (int i = 0; i < STATION_PER_LINE; i++)
1532 sysadm 1.20 {
1533 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
1534 sysadm 1.20 }
1535 sysadm 1.43 bbsnet_selchange();
1536 sysadm 1.14 break;
1537     case KEY_DOWN:
1538 sysadm 1.98 for (int i = 0; i < STATION_PER_LINE; i++)
1539 sysadm 1.20 {
1540 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
1541 sysadm 1.20 }
1542 sysadm 1.43 bbsnet_selchange();
1543 sysadm 1.14 break;
1544     case KEY_LEFT:
1545     menu_control(&bbsnet_menu, KEY_UP);
1546 sysadm 1.43 bbsnet_selchange();
1547 sysadm 1.14 break;
1548     case KEY_RIGHT:
1549     menu_control(&bbsnet_menu, KEY_DOWN);
1550 sysadm 1.43 bbsnet_selchange();
1551     break;
1552 sysadm 1.44 case KEY_HOME:
1553 sysadm 1.43 case KEY_PGUP:
1554     menu_control(&bbsnet_menu, KEY_PGUP);
1555     bbsnet_selchange();
1556 sysadm 1.14 break;
1557 sysadm 1.44 case KEY_END:
1558     case KEY_PGDN:
1559     menu_control(&bbsnet_menu, KEY_PGDN);
1560     bbsnet_selchange();
1561     break;
1562 sysadm 1.14 default:
1563     menu_control(&bbsnet_menu, ch);
1564 sysadm 1.43 bbsnet_selchange();
1565 sysadm 1.14 break;
1566     }
1567 sysadm 1.1 }
1568    
1569 sysadm 1.40 cleanup:
1570     unload_bbsnet_conf();
1571    
1572 sysadm 1.14 return 0;
1573 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1