/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.61 - (hide annotations)
Sun Oct 5 00:49:56 2025 UTC (5 months, 1 week ago) by sysadm
Branch: MAIN
Changes since 1.60: +8 -3 lines
Content type: text/x-csrc
Refine

1 sysadm 1.1 /***************************************************************************
2 sysadm 1.14 bbs_net.c - description
3     -------------------
4 sysadm 1.25 Copyright : (C) 2004-2025 by Leaflet
5     Email : leaflet@leafok.com
6 sysadm 1.1 ***************************************************************************/
7    
8     /***************************************************************************
9     * *
10     * This program is free software; you can redistribute it and/or modify *
11     * it under the terms of the GNU General Public License as published by *
12 sysadm 1.25 * the Free Software Foundation; either version 3 of the License, or *
13 sysadm 1.1 * (at your option) any later version. *
14     * *
15     ***************************************************************************/
16    
17     #include "bbs.h"
18     #include "common.h"
19 sysadm 1.55 #include "io.h"
20 sysadm 1.15 #include "log.h"
21 sysadm 1.55 #include "login.h"
22     #include "menu.h"
23 sysadm 1.15 #include "screen.h"
24 sysadm 1.55 #include <errno.h>
25     #include <fcntl.h>
26     #include <netdb.h>
27     #include <stdarg.h>
28 sysadm 1.1 #include <stdio.h>
29 sysadm 1.55 #include <stdlib.h>
30 sysadm 1.29 #include <string.h>
31     #include <time.h>
32     #include <unistd.h>
33 sysadm 1.55 #include <arpa/inet.h>
34 sysadm 1.60 #include <iconv.h>
35 sysadm 1.55 #include <libssh/libssh.h>
36     #include <libssh/server.h>
37     #include <libssh/callbacks.h>
38     #include <netinet/in.h>
39     #include <netinet/ip.h>
40 sysadm 1.29 #include <sys/select.h>
41 sysadm 1.1 #include <sys/ioctl.h>
42     #include <sys/socket.h>
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.1
45 sysadm 1.26 #define MENU_CONF_DELIM " \t\r\n"
46    
47 sysadm 1.14 #define MAX_PROCESS_BAR_LEN 30
48     #define MAXSTATION 26 * 2
49     #define STATION_PER_LINE 4
50 sysadm 1.1
51     struct _bbsnet_conf
52     {
53 sysadm 1.14 char host1[20];
54     char host2[40];
55     char ip[40];
56 sysadm 1.24 in_port_t port;
57 sysadm 1.60 char charset[20];
58 sysadm 1.1 } bbsnet_conf[MAXSTATION];
59    
60     MENU_SET bbsnet_menu;
61    
62 sysadm 1.14 int load_bbsnet_conf(const char *file_config)
63 sysadm 1.1 {
64 sysadm 1.14 FILE *fp;
65     MENU *p_menu;
66 sysadm 1.41 MENU_ITEM *p_menu_item;
67     MENU_ITEM_ID menu_item_id;
68 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
69 sysadm 1.14
70     fp = fopen(file_config, "r");
71     if (fp == NULL)
72 sysadm 1.20 {
73 sysadm 1.14 return -1;
74 sysadm 1.20 }
75 sysadm 1.14
76 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
77     if (bbsnet_menu.p_menu_pool == NULL)
78     {
79     log_error("calloc(p_menu_pool) error\n");
80     return -3;
81     }
82     bbsnet_menu.menu_count = 1;
83    
84     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
85     if (bbsnet_menu.p_menu_item_pool == NULL)
86     {
87     log_error("calloc(p_menu_item_pool) error\n");
88     return -3;
89     }
90     bbsnet_menu.menu_item_count = MAXSTATION;
91    
92     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
93 sysadm 1.40
94 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
95     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
96 sysadm 1.14 p_menu->title.show = 0;
97 sysadm 1.41 p_menu->screen_show = 0;
98 sysadm 1.1
99 sysadm 1.41 menu_item_id = 0;
100     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
101 sysadm 1.14 {
102 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
103     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
104     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
105     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
106 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
107 sysadm 1.14
108 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
109 sysadm 1.18 {
110 sysadm 1.14 continue;
111 sysadm 1.18 }
112    
113 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
114     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
115     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
116     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
117     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
118     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
119     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
120 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
121     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
122 sysadm 1.14
123 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
124     if (p_menu_item == NULL)
125     {
126     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
127     return -1;
128     }
129 sysadm 1.14
130 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
131     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
132     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
133     p_menu_item->submenu = 0;
134     p_menu_item->priv = 0;
135     p_menu_item->level = 0;
136     p_menu_item->name[0] =
137     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
138     p_menu_item->name[1] = '\0';
139     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
140     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
141    
142     p_menu->items[p_menu->item_count] = menu_item_id;
143     p_menu->item_count++;
144     menu_item_id++;
145     }
146    
147     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
148     bbsnet_menu.menu_id_path[0] = 0;
149     bbsnet_menu.menu_item_pos[0] = 0;
150     bbsnet_menu.choose_step = 0;
151 sysadm 1.14
152 sysadm 1.41 fclose(fp);
153 sysadm 1.14
154     return 0;
155 sysadm 1.1 }
156    
157 sysadm 1.40 void unload_bbsnet_conf(void)
158     {
159 sysadm 1.41 bbsnet_menu.menu_count = 0;
160     bbsnet_menu.menu_item_count = 0;
161    
162     free(bbsnet_menu.p_menu_pool);
163     bbsnet_menu.p_menu_pool = NULL;
164     free(bbsnet_menu.p_menu_item_pool);
165     bbsnet_menu.p_menu_item_pool = NULL;
166 sysadm 1.40 }
167    
168     void process_bar(int n, int len)
169 sysadm 1.1 {
170 sysadm 1.27 char buf[LINE_BUFFER_LEN];
171     char buf2[LINE_BUFFER_LEN];
172    
173     if (len > LINE_BUFFER_LEN)
174     {
175     len = LINE_BUFFER_LEN - 1;
176     }
177     if (n < 0)
178     {
179     n = 0;
180     }
181     else if (n > len)
182     {
183     n = len;
184     }
185 sysadm 1.14
186     moveto(4, 0);
187 sysadm 1.23 prints(" ------------------------------ \r\n");
188 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
189 sysadm 1.30 strncpy(buf2, buf, (size_t)n);
190 sysadm 1.27 buf2[n] = '\0';
191     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
192 sysadm 1.23 prints(" ------------------------------ \r\n");
193 sysadm 1.14 iflush();
194 sysadm 1.1 }
195    
196 sysadm 1.60 int bbsnet_io_buf_conv(iconv_t cd, char *p_buf, int *p_buf_len, int *p_buf_offset, char *p_conv, size_t conv_size, int *p_conv_len)
197     {
198     char *in_buf;
199     char *out_buf;
200     size_t in_bytes;
201     size_t out_bytes;
202     int ret;
203    
204     in_buf = p_buf + *p_buf_offset;
205     in_bytes = (size_t)(*p_buf_len - *p_buf_offset);
206     out_buf = p_conv + *p_conv_len;
207     out_bytes = conv_size - (size_t)(*p_conv_len);
208    
209     while (in_bytes > 0)
210     {
211     ret = (int)iconv(cd, &in_buf, &in_bytes, &out_buf, &out_bytes);
212     if (ret == -1)
213     {
214     if (errno == EINVAL) // Incomplete
215     {
216 sysadm 1.61 #ifdef _DEBUG
217     log_error("iconv(inbytes=%d, outbytes=%d) error: EINVAL\n", in_bytes, out_bytes);
218     #endif
219 sysadm 1.60 *p_buf_len = (int)(p_buf + *p_buf_len - in_buf);
220     *p_buf_offset = 0;
221     *p_conv_len = (int)(conv_size - out_bytes);
222     memmove(p_buf, in_buf, (size_t)(*p_buf_len));
223    
224     break;
225     }
226     else if (errno == E2BIG)
227     {
228     log_error("iconv(inbytes=%d, outbytes=%d) error: E2BIG\n", in_bytes, out_bytes);
229     return -1;
230     }
231     else if (errno == EILSEQ)
232     {
233     if (in_bytes > out_bytes || out_bytes <= 0)
234     {
235 sysadm 1.61 log_error("iconv(inbytes=%d, outbytes=%d) error: EILSEQ and E2BIG\n", in_bytes, out_bytes);
236     return -2;
237 sysadm 1.60 }
238    
239 sysadm 1.61 *out_buf = *in_buf;
240     in_buf++;
241     out_buf++;
242 sysadm 1.60 in_bytes--;
243     out_bytes--;
244    
245     continue;
246     }
247     }
248     else
249     {
250     *p_buf_len = 0;
251     *p_buf_offset = 0;
252     *p_conv_len = (int)(conv_size - out_bytes);
253    
254     break;
255     }
256     }
257    
258     return 0;
259     }
260    
261 sysadm 1.14 int bbsnet_connect(int n)
262 sysadm 1.1 {
263 sysadm 1.36 int sock, ret, loop, error;
264 sysadm 1.38 int sock_connected = 0;
265 sysadm 1.36 int flags_sock;
266     int flags_stdin;
267     int flags_stdout;
268     int len;
269 sysadm 1.14 struct sockaddr_in sin;
270 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
271     char output_buf[LINE_BUFFER_LEN];
272     int input_buf_len = 0;
273     int output_buf_len = 0;
274     int input_buf_offset = 0;
275     int output_buf_offset = 0;
276 sysadm 1.60 iconv_t input_cd = NULL;
277     char input_conv[LINE_BUFFER_LEN * 2];
278     char output_conv[LINE_BUFFER_LEN * 2];
279     int input_conv_len = 0;
280     int output_conv_len = 0;
281     int input_conv_offset = 0;
282     int output_conv_offset = 0;
283     iconv_t output_cd = NULL;
284 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
285     int nfds, epollfd;
286     int stdin_read_wait = 0;
287     int stdout_write_wait = 0;
288     int sock_read_wait = 0;
289     int sock_write_wait = 0;
290 sysadm 1.26 struct hostent *p_host = NULL;
291 sysadm 1.31 int tos;
292 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
293 sysadm 1.14 int remote_port;
294 sysadm 1.56 time_t t_used = time(NULL);
295 sysadm 1.14 struct tm *tm_used;
296 sysadm 1.26 int ch;
297 sysadm 1.14
298 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
299     {
300     log_error("user_online_update(BBS_NET) error\n");
301     }
302    
303 sysadm 1.14 clearscr();
304    
305     moveto(0, 0);
306 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
307 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
308     iflush();
309    
310 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
311 sysadm 1.14
312 sysadm 1.26 if (p_host == NULL)
313 sysadm 1.1 {
314 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
315 sysadm 1.14 press_any_key();
316     return -1;
317 sysadm 1.1 }
318 sysadm 1.14
319     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
320    
321     if (sock < 0)
322 sysadm 1.1 {
323 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
324 sysadm 1.14 press_any_key();
325     return -1;
326 sysadm 1.1 }
327    
328 sysadm 1.14 sin.sin_family = AF_INET;
329 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
330 sysadm 1.14 sin.sin_port = 0;
331    
332     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
333     {
334 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
335     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
336 sysadm 1.14 return -2;
337     }
338 sysadm 1.1
339 sysadm 1.49 memset(&sin, 0, sizeof(sin));
340 sysadm 1.14 sin.sin_family = AF_INET;
341 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
342 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
343    
344 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
345     remote_addr[sizeof(remote_addr) - 1] = '\0';
346 sysadm 1.14 remote_port = ntohs(sin.sin_port);
347    
348 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
349 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
350 sysadm 1.29
351 sysadm 1.39 // Set socket as non-blocking
352     flags_sock = fcntl(sock, F_GETFL, 0);
353     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
354    
355     // Set STDIN/STDOUT as non-blocking
356     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
357     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
358     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
359     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
360    
361 sysadm 1.38 epollfd = epoll_create1(0);
362     if (epollfd < 0)
363     {
364     log_error("epoll_create1() error (%d)\n", errno);
365     return -1;
366     }
367    
368 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
369 sysadm 1.38 ev.data.fd = sock;
370     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
371     {
372     log_error("epoll_ctl(socket) error (%d)\n", errno);
373 sysadm 1.39 goto cleanup;
374 sysadm 1.38 }
375    
376 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
377 sysadm 1.38 ev.data.fd = STDIN_FILENO;
378     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
379     {
380     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
381 sysadm 1.39 goto cleanup;
382 sysadm 1.38 }
383    
384     while (!SYS_server_exit)
385 sysadm 1.29 {
386 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
387 sysadm 1.29 {
388 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
389     {
390     // Use select / epoll to check writability of the socket,
391     // then use getsockopt to check the status of the socket.
392     // See man connect(2)
393     break;
394     }
395     else if (errno == EINTR)
396     {
397     continue;
398     }
399     else
400     {
401     log_error("connect(socket) error (%d)\n", errno);
402 sysadm 1.39
403 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
404 sysadm 1.38 press_any_key();
405 sysadm 1.39
406     goto cleanup;
407 sysadm 1.38 }
408 sysadm 1.29 }
409     }
410    
411 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
412 sysadm 1.1 {
413 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
414 sysadm 1.29
415 sysadm 1.38 if (nfds < 0)
416 sysadm 1.20 {
417 sysadm 1.29 if (errno != EINTR)
418     {
419 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
420 sysadm 1.39 break;
421 sysadm 1.29 }
422 sysadm 1.20 }
423 sysadm 1.38 else if (nfds == 0) // timeout
424     {
425     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
426     }
427     else // ret > 0
428 sysadm 1.14 {
429 sysadm 1.38 for (int i = 0; i < nfds; i++)
430 sysadm 1.29 {
431 sysadm 1.38 if (events[i].data.fd == sock)
432     {
433     len = sizeof(error);
434     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
435     {
436     log_error("getsockopt() error (%d) !\n", error);
437 sysadm 1.39 goto cleanup;
438 sysadm 1.38 }
439     if (error == 0)
440     {
441     sock_connected = 1;
442     }
443     }
444     else if (events[i].data.fd == STDIN_FILENO)
445     {
446     ch = igetch(0);
447 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
448 sysadm 1.38 {
449 sysadm 1.39 goto cleanup;
450 sysadm 1.38 }
451     }
452 sysadm 1.29 }
453 sysadm 1.14 }
454 sysadm 1.12 }
455 sysadm 1.38 if (SYS_server_exit)
456     {
457 sysadm 1.39 goto cleanup;
458 sysadm 1.38 }
459     if (!sock_connected)
460 sysadm 1.12 {
461 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
462 sysadm 1.14 press_any_key();
463 sysadm 1.39
464     goto cleanup;
465 sysadm 1.12 }
466 sysadm 1.29
467 sysadm 1.31 tos = IPTOS_LOWDELAY;
468     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
469     {
470     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
471     }
472 sysadm 1.14
473 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
474 sysadm 1.33 iflush();
475 sysadm 1.46 log_common("BBSNET connect to %s:%d\n", remote_addr, remote_port);
476 sysadm 1.14
477 sysadm 1.60 input_cd = iconv_open(bbsnet_conf[n].charset, "UTF-8");
478     if (input_cd == (iconv_t)(-1))
479     {
480     log_error("iconv_open(UTF8->GBK) error: %d\n", errno);
481     goto cleanup;
482     }
483     output_cd = iconv_open("UTF-8", bbsnet_conf[n].charset);
484     if (input_cd == (iconv_t)(-1))
485     {
486     log_error("iconv_open(GBK->UTF-8) error: %d\n", errno);
487     iconv_close(input_cd);
488     goto cleanup;
489     }
490    
491 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
492     ev.data.fd = sock;
493     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
494     {
495     log_error("epoll_ctl(socket) error (%d)\n", errno);
496 sysadm 1.39 goto cleanup;
497 sysadm 1.38 }
498    
499 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
500 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
501     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
502     {
503     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
504 sysadm 1.39 goto cleanup;
505 sysadm 1.38 }
506    
507 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
508 sysadm 1.14 loop = 1;
509    
510 sysadm 1.26 while (loop && !SYS_server_exit)
511 sysadm 1.12 {
512 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
513     {
514     log_error("SSH channel is closed\n");
515     loop = 0;
516     break;
517     }
518    
519 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
520 sysadm 1.33
521 sysadm 1.38 if (nfds < 0)
522 sysadm 1.14 {
523 sysadm 1.38 if (errno != EINTR)
524 sysadm 1.14 {
525 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
526     break;
527 sysadm 1.14 }
528 sysadm 1.38 continue;
529 sysadm 1.14 }
530 sysadm 1.38 else if (nfds == 0) // timeout
531 sysadm 1.1 {
532 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
533 sysadm 1.28 {
534 sysadm 1.38 break;
535 sysadm 1.28 }
536 sysadm 1.1 }
537 sysadm 1.38
538     for (int i = 0; i < nfds; i++)
539 sysadm 1.1 {
540 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
541 sysadm 1.14 {
542 sysadm 1.38 stdin_read_wait = 1;
543 sysadm 1.59 }
544    
545     if (events[i].data.fd == sock)
546     {
547     if (events[i].events & EPOLLIN)
548     {
549     sock_read_wait = 1;
550     }
551     if (events[i].events & EPOLLOUT)
552     {
553     sock_write_wait = 1;
554     }
555     }
556    
557     if (events[i].data.fd == STDOUT_FILENO)
558     {
559     stdout_write_wait = 1;
560     }
561     }
562    
563     if (stdin_read_wait)
564     {
565     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
566     {
567     if (SSH_v2)
568 sysadm 1.33 {
569 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
570     if (ret == SSH_ERROR)
571 sysadm 1.47 {
572 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
573     loop = 0;
574     break;
575 sysadm 1.47 }
576 sysadm 1.59 else if (ret == SSH_EOF)
577 sysadm 1.47 {
578 sysadm 1.59 stdin_read_wait = 0;
579     loop = 0;
580     break;
581 sysadm 1.47 }
582 sysadm 1.59 else if (ret == 0)
583 sysadm 1.33 {
584 sysadm 1.59 stdin_read_wait = 0;
585     break; // Check whether channel is still open
586 sysadm 1.38 }
587 sysadm 1.59 }
588     else
589     {
590     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
591     }
592     if (ret < 0)
593     {
594     if (errno == EAGAIN || errno == EWOULDBLOCK)
595 sysadm 1.38 {
596     stdin_read_wait = 0;
597     break;
598     }
599 sysadm 1.59 else if (errno == EINTR)
600     {
601     continue;
602     }
603 sysadm 1.38 else
604     {
605 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
606     loop = 0;
607     break;
608     }
609     }
610     else if (ret == 0) // broken pipe
611     {
612     #ifdef _DEBUG
613     log_error("read(STDIN) EOF\n");
614     #endif
615     stdin_read_wait = 0;
616     loop = 0;
617     break;
618     }
619     else
620     {
621     input_buf_len += ret;
622     BBS_last_access_tm = time(NULL);
623 sysadm 1.58
624 sysadm 1.59 // Refresh current action while user input
625     if (user_online_update("BBS_NET") < 0)
626     {
627     log_error("user_online_update(BBS_NET) error\n");
628     }
629 sysadm 1.58
630 sysadm 1.59 continue;
631 sysadm 1.33 }
632 sysadm 1.36 }
633 sysadm 1.59 }
634 sysadm 1.29
635 sysadm 1.59 if (sock_write_wait)
636     {
637 sysadm 1.60 if (input_buf_offset < input_buf_len)
638 sysadm 1.36 {
639 sysadm 1.60 ret = bbsnet_io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
640     if (ret < 0)
641     {
642     log_error("bbsnet_io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
643     }
644     }
645    
646     while (input_conv_offset < input_conv_len && !SYS_server_exit)
647     {
648     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
649 sysadm 1.59 if (ret < 0)
650 sysadm 1.36 {
651 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
652 sysadm 1.36 {
653 sysadm 1.59 sock_write_wait = 0;
654     break;
655 sysadm 1.38 }
656 sysadm 1.59 else if (errno == EINTR)
657 sysadm 1.38 {
658 sysadm 1.59 continue;
659     }
660     else
661     {
662     log_error("write(socket) error (%d)\n", errno);
663 sysadm 1.36 loop = 0;
664 sysadm 1.38 break;
665     }
666 sysadm 1.59 }
667     else if (ret == 0) // broken pipe
668     {
669     #ifdef _DEBUG
670     log_error("write(socket) EOF\n");
671     #endif
672     sock_write_wait = 0;
673     loop = 0;
674     break;
675     }
676     else
677     {
678 sysadm 1.60 input_conv_offset += ret;
679     if (input_conv_offset >= input_conv_len) // Output buffer complete
680 sysadm 1.38 {
681 sysadm 1.60 input_conv_offset = 0;
682     input_conv_len = 0;
683 sysadm 1.59 break;
684 sysadm 1.36 }
685 sysadm 1.59 continue;
686 sysadm 1.36 }
687 sysadm 1.14 }
688 sysadm 1.59 }
689 sysadm 1.36
690 sysadm 1.59 if (sock_read_wait)
691     {
692     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
693 sysadm 1.14 {
694 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
695     if (ret < 0)
696 sysadm 1.14 {
697 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
698 sysadm 1.38 {
699 sysadm 1.59 sock_read_wait = 0;
700     break;
701 sysadm 1.38 }
702 sysadm 1.59 else if (errno == EINTR)
703 sysadm 1.33 {
704 sysadm 1.59 continue;
705 sysadm 1.38 }
706     else
707     {
708 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
709     loop = 0;
710     break;
711 sysadm 1.33 }
712     }
713 sysadm 1.59 else if (ret == 0) // broken pipe
714     {
715     #ifdef _DEBUG
716     log_error("read(socket) EOF\n");
717     #endif
718     sock_read_wait = 0;
719     loop = 0;
720     break;
721     }
722     else
723     {
724     output_buf_len += ret;
725     continue;
726     }
727 sysadm 1.36 }
728 sysadm 1.59 }
729 sysadm 1.36
730 sysadm 1.59 if (stdout_write_wait)
731     {
732 sysadm 1.60 if (output_buf_offset < output_buf_len)
733     {
734     ret = bbsnet_io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
735     if (ret < 0)
736     {
737     log_error("bbsnet_io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
738     }
739     }
740    
741     while (output_conv_offset < output_conv_len && !SYS_server_exit)
742 sysadm 1.36 {
743 sysadm 1.59 if (SSH_v2)
744 sysadm 1.36 {
745 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
746 sysadm 1.59 if (ret == SSH_ERROR)
747 sysadm 1.47 {
748 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
749     loop = 0;
750     break;
751 sysadm 1.47 }
752 sysadm 1.59 }
753     else
754     {
755 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
756 sysadm 1.59 }
757     if (ret < 0)
758     {
759     if (errno == EAGAIN || errno == EWOULDBLOCK)
760 sysadm 1.47 {
761 sysadm 1.59 stdout_write_wait = 0;
762     break;
763 sysadm 1.47 }
764 sysadm 1.59 else if (errno == EINTR)
765 sysadm 1.38 {
766 sysadm 1.59 continue;
767 sysadm 1.38 }
768 sysadm 1.59 else
769 sysadm 1.33 {
770 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
771 sysadm 1.36 loop = 0;
772 sysadm 1.38 break;
773     }
774 sysadm 1.59 }
775     else if (ret == 0) // broken pipe
776     {
777     #ifdef _DEBUG
778     log_error("write(STDOUT) EOF\n");
779     #endif
780     stdout_write_wait = 0;
781     loop = 0;
782     break;
783     }
784     else
785     {
786 sysadm 1.60 output_conv_offset += ret;
787     if (output_conv_offset >= output_conv_len) // Output buffer complete
788 sysadm 1.38 {
789 sysadm 1.60 output_conv_offset = 0;
790     output_conv_len = 0;
791 sysadm 1.59 break;
792 sysadm 1.36 }
793 sysadm 1.59 continue;
794 sysadm 1.36 }
795 sysadm 1.14 }
796 sysadm 1.1 }
797     }
798    
799 sysadm 1.60 iconv_close(input_cd);
800     iconv_close(output_cd);
801    
802 sysadm 1.39 cleanup:
803     if (close(epollfd) < 0)
804     {
805     log_error("close(epoll) error (%d)\n");
806     }
807    
808 sysadm 1.36 // Restore STDIN/STDOUT flags
809     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
810     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
811    
812     // Restore socket flags
813     fcntl(sock, F_SETFL, flags_sock);
814    
815 sysadm 1.14 if (close(sock) == -1)
816     {
817     log_error("Close socket failed\n");
818     }
819 sysadm 1.1
820 sysadm 1.50 t_used = time(NULL) - t_used;
821 sysadm 1.14 tm_used = gmtime(&t_used);
822 sysadm 1.8
823 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
824 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
825     tm_used->tm_sec);
826 sysadm 1.8
827 sysadm 1.14 return 0;
828 sysadm 1.1 }
829    
830     static int
831 sysadm 1.14 bbsnet_refresh()
832 sysadm 1.1 {
833 sysadm 1.14 clearscr();
834     moveto(1, 0);
835 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
836 sysadm 1.20 for (int i = 2; i < 19; i++)
837 sysadm 1.14 {
838     moveto(i, 0);
839 sysadm 1.23 prints("|");
840 sysadm 1.14 moveto(i, 79);
841 sysadm 1.23 prints("|");
842 sysadm 1.14 }
843     moveto(19, 0);
844 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
845 sysadm 1.14 moveto(22, 0);
846 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
847 sysadm 1.14 moveto(23, 0);
848 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
849 sysadm 1.13
850 sysadm 1.14 iflush();
851 sysadm 1.1
852 sysadm 1.14 return 0;
853 sysadm 1.1 }
854    
855 sysadm 1.43 int bbsnet_selchange()
856 sysadm 1.1 {
857 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
858    
859 sysadm 1.14 moveto(20, 0);
860     clrtoeol();
861 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
862 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
863 sysadm 1.14 moveto(20, 79);
864 sysadm 1.23 prints("|");
865 sysadm 1.14 moveto(21, 0);
866     clrtoeol();
867 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
868 sysadm 1.43 if (bbsnet_conf[i].port != 23)
869 sysadm 1.20 {
870 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
871 sysadm 1.20 }
872 sysadm 1.14 prints("\x1b[m");
873     moveto(21, 79);
874 sysadm 1.23 prints("|");
875 sysadm 1.14 iflush();
876 sysadm 1.1
877 sysadm 1.14 return 0;
878 sysadm 1.1 }
879    
880 sysadm 1.14 int bbs_net()
881 sysadm 1.1 {
882 sysadm 1.43 int ch, i;
883 sysadm 1.1
884 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
885 sysadm 1.1
886 sysadm 1.50 BBS_last_access_tm = time(NULL);
887 sysadm 1.14
888     clearscr();
889     bbsnet_refresh();
890 sysadm 1.41 display_menu(&bbsnet_menu);
891 sysadm 1.43 bbsnet_selchange();
892 sysadm 1.14
893 sysadm 1.26 while (!SYS_server_exit)
894 sysadm 1.1 {
895 sysadm 1.39 ch = igetch(100);
896 sysadm 1.52
897 sysadm 1.14 switch (ch)
898     {
899 sysadm 1.47 case KEY_NULL: // broken pipe
900 sysadm 1.45 case KEY_ESC:
901 sysadm 1.35 case Ctrl('C'): // user cancel
902 sysadm 1.40 goto cleanup;
903 sysadm 1.14 case KEY_TIMEOUT:
904 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
905 sysadm 1.14 {
906 sysadm 1.40 goto cleanup;
907 sysadm 1.14 }
908 sysadm 1.29 continue;
909 sysadm 1.14 case CR:
910 sysadm 1.41 igetch_reset();
911 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
912 sysadm 1.14 bbsnet_refresh();
913 sysadm 1.41 display_menu(&bbsnet_menu);
914 sysadm 1.43 bbsnet_selchange();
915 sysadm 1.14 break;
916     case KEY_UP:
917     for (i = 0; i < STATION_PER_LINE; i++)
918 sysadm 1.20 {
919 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
920 sysadm 1.20 }
921 sysadm 1.43 bbsnet_selchange();
922 sysadm 1.14 break;
923     case KEY_DOWN:
924     for (i = 0; i < STATION_PER_LINE; i++)
925 sysadm 1.20 {
926 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
927 sysadm 1.20 }
928 sysadm 1.43 bbsnet_selchange();
929 sysadm 1.14 break;
930     case KEY_LEFT:
931     menu_control(&bbsnet_menu, KEY_UP);
932 sysadm 1.43 bbsnet_selchange();
933 sysadm 1.14 break;
934     case KEY_RIGHT:
935     menu_control(&bbsnet_menu, KEY_DOWN);
936 sysadm 1.43 bbsnet_selchange();
937     break;
938 sysadm 1.44 case KEY_HOME:
939 sysadm 1.43 case KEY_PGUP:
940     menu_control(&bbsnet_menu, KEY_PGUP);
941     bbsnet_selchange();
942 sysadm 1.14 break;
943 sysadm 1.44 case KEY_END:
944     case KEY_PGDN:
945     menu_control(&bbsnet_menu, KEY_PGDN);
946     bbsnet_selchange();
947     break;
948 sysadm 1.14 default:
949     menu_control(&bbsnet_menu, ch);
950 sysadm 1.43 bbsnet_selchange();
951 sysadm 1.14 break;
952     }
953 sysadm 1.50 BBS_last_access_tm = time(NULL);
954 sysadm 1.1 }
955    
956 sysadm 1.40 cleanup:
957     unload_bbsnet_conf();
958    
959 sysadm 1.14 return 0;
960 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1