/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.65 - (hide annotations)
Fri Oct 17 01:25:08 2025 UTC (5 months ago) by sysadm
Branch: MAIN
Changes since 1.64: +0 -1 lines
Content type: text/x-csrc
No longer use igetch_reset() to skip remaining \n after \r
\r\n -> \r and \n -> \r conversions have already been implemented in igetch()

1 sysadm 1.1 /***************************************************************************
2 sysadm 1.14 bbs_net.c - description
3     -------------------
4 sysadm 1.25 Copyright : (C) 2004-2025 by Leaflet
5     Email : leaflet@leafok.com
6 sysadm 1.1 ***************************************************************************/
7    
8     /***************************************************************************
9     * *
10     * This program is free software; you can redistribute it and/or modify *
11     * it under the terms of the GNU General Public License as published by *
12 sysadm 1.25 * the Free Software Foundation; either version 3 of the License, or *
13 sysadm 1.1 * (at your option) any later version. *
14     * *
15     ***************************************************************************/
16    
17     #include "bbs.h"
18     #include "common.h"
19 sysadm 1.55 #include "io.h"
20 sysadm 1.15 #include "log.h"
21 sysadm 1.55 #include "login.h"
22     #include "menu.h"
23 sysadm 1.15 #include "screen.h"
24 sysadm 1.55 #include <errno.h>
25     #include <fcntl.h>
26     #include <netdb.h>
27     #include <stdarg.h>
28 sysadm 1.1 #include <stdio.h>
29 sysadm 1.55 #include <stdlib.h>
30 sysadm 1.29 #include <string.h>
31     #include <time.h>
32     #include <unistd.h>
33 sysadm 1.55 #include <arpa/inet.h>
34 sysadm 1.60 #include <iconv.h>
35 sysadm 1.55 #include <libssh/libssh.h>
36     #include <libssh/server.h>
37     #include <libssh/callbacks.h>
38     #include <netinet/in.h>
39     #include <netinet/ip.h>
40 sysadm 1.29 #include <sys/select.h>
41 sysadm 1.1 #include <sys/ioctl.h>
42     #include <sys/socket.h>
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.1
45 sysadm 1.26 #define MENU_CONF_DELIM " \t\r\n"
46    
47 sysadm 1.14 #define MAX_PROCESS_BAR_LEN 30
48     #define MAXSTATION 26 * 2
49     #define STATION_PER_LINE 4
50 sysadm 1.1
51 sysadm 1.62 #define BBS_NET_DEFAULT_CHARSET "UTF-8"
52    
53 sysadm 1.1 struct _bbsnet_conf
54     {
55 sysadm 1.14 char host1[20];
56     char host2[40];
57     char ip[40];
58 sysadm 1.24 in_port_t port;
59 sysadm 1.60 char charset[20];
60 sysadm 1.1 } bbsnet_conf[MAXSTATION];
61    
62     MENU_SET bbsnet_menu;
63    
64 sysadm 1.14 int load_bbsnet_conf(const char *file_config)
65 sysadm 1.1 {
66 sysadm 1.14 FILE *fp;
67     MENU *p_menu;
68 sysadm 1.41 MENU_ITEM *p_menu_item;
69     MENU_ITEM_ID menu_item_id;
70 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
71 sysadm 1.14
72     fp = fopen(file_config, "r");
73     if (fp == NULL)
74 sysadm 1.20 {
75 sysadm 1.14 return -1;
76 sysadm 1.20 }
77 sysadm 1.14
78 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
79     if (bbsnet_menu.p_menu_pool == NULL)
80     {
81     log_error("calloc(p_menu_pool) error\n");
82     return -3;
83     }
84     bbsnet_menu.menu_count = 1;
85    
86     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
87     if (bbsnet_menu.p_menu_item_pool == NULL)
88     {
89     log_error("calloc(p_menu_item_pool) error\n");
90     return -3;
91     }
92     bbsnet_menu.menu_item_count = MAXSTATION;
93    
94     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
95 sysadm 1.40
96 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
97     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
98 sysadm 1.14 p_menu->title.show = 0;
99 sysadm 1.41 p_menu->screen_show = 0;
100 sysadm 1.1
101 sysadm 1.41 menu_item_id = 0;
102     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
103 sysadm 1.14 {
104 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
105     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
106     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
107     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
108 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
109 sysadm 1.14
110 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
111 sysadm 1.18 {
112 sysadm 1.14 continue;
113 sysadm 1.18 }
114    
115 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
116     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
117     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
118     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
119     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
120     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
121     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
122 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
123     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
124 sysadm 1.14
125 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
126     if (p_menu_item == NULL)
127     {
128     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
129     return -1;
130     }
131 sysadm 1.14
132 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
133     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
134     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
135     p_menu_item->submenu = 0;
136     p_menu_item->priv = 0;
137     p_menu_item->level = 0;
138     p_menu_item->name[0] =
139     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
140     p_menu_item->name[1] = '\0';
141     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
142     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
143    
144     p_menu->items[p_menu->item_count] = menu_item_id;
145     p_menu->item_count++;
146     menu_item_id++;
147     }
148    
149     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
150     bbsnet_menu.menu_id_path[0] = 0;
151     bbsnet_menu.menu_item_pos[0] = 0;
152     bbsnet_menu.choose_step = 0;
153 sysadm 1.14
154 sysadm 1.41 fclose(fp);
155 sysadm 1.14
156     return 0;
157 sysadm 1.1 }
158    
159 sysadm 1.40 void unload_bbsnet_conf(void)
160     {
161 sysadm 1.41 bbsnet_menu.menu_count = 0;
162     bbsnet_menu.menu_item_count = 0;
163    
164     free(bbsnet_menu.p_menu_pool);
165     bbsnet_menu.p_menu_pool = NULL;
166     free(bbsnet_menu.p_menu_item_pool);
167     bbsnet_menu.p_menu_item_pool = NULL;
168 sysadm 1.40 }
169    
170     void process_bar(int n, int len)
171 sysadm 1.1 {
172 sysadm 1.27 char buf[LINE_BUFFER_LEN];
173     char buf2[LINE_BUFFER_LEN];
174    
175     if (len > LINE_BUFFER_LEN)
176     {
177     len = LINE_BUFFER_LEN - 1;
178     }
179     if (n < 0)
180     {
181     n = 0;
182     }
183     else if (n > len)
184     {
185     n = len;
186     }
187 sysadm 1.14
188     moveto(4, 0);
189 sysadm 1.23 prints(" ------------------------------ \r\n");
190 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
191 sysadm 1.30 strncpy(buf2, buf, (size_t)n);
192 sysadm 1.27 buf2[n] = '\0';
193     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
194 sysadm 1.23 prints(" ------------------------------ \r\n");
195 sysadm 1.14 iflush();
196 sysadm 1.1 }
197    
198 sysadm 1.60 int bbsnet_io_buf_conv(iconv_t cd, char *p_buf, int *p_buf_len, int *p_buf_offset, char *p_conv, size_t conv_size, int *p_conv_len)
199     {
200     char *in_buf;
201     char *out_buf;
202     size_t in_bytes;
203     size_t out_bytes;
204     int ret;
205    
206     in_buf = p_buf + *p_buf_offset;
207     in_bytes = (size_t)(*p_buf_len - *p_buf_offset);
208     out_buf = p_conv + *p_conv_len;
209     out_bytes = conv_size - (size_t)(*p_conv_len);
210    
211     while (in_bytes > 0)
212     {
213     ret = (int)iconv(cd, &in_buf, &in_bytes, &out_buf, &out_bytes);
214     if (ret == -1)
215     {
216     if (errno == EINVAL) // Incomplete
217     {
218 sysadm 1.61 #ifdef _DEBUG
219     log_error("iconv(inbytes=%d, outbytes=%d) error: EINVAL\n", in_bytes, out_bytes);
220     #endif
221 sysadm 1.60 *p_buf_len = (int)(p_buf + *p_buf_len - in_buf);
222     *p_buf_offset = 0;
223     *p_conv_len = (int)(conv_size - out_bytes);
224     memmove(p_buf, in_buf, (size_t)(*p_buf_len));
225    
226     break;
227     }
228     else if (errno == E2BIG)
229     {
230     log_error("iconv(inbytes=%d, outbytes=%d) error: E2BIG\n", in_bytes, out_bytes);
231     return -1;
232     }
233     else if (errno == EILSEQ)
234     {
235     if (in_bytes > out_bytes || out_bytes <= 0)
236     {
237 sysadm 1.61 log_error("iconv(inbytes=%d, outbytes=%d) error: EILSEQ and E2BIG\n", in_bytes, out_bytes);
238     return -2;
239 sysadm 1.60 }
240    
241 sysadm 1.61 *out_buf = *in_buf;
242     in_buf++;
243     out_buf++;
244 sysadm 1.60 in_bytes--;
245     out_bytes--;
246    
247     continue;
248     }
249     }
250     else
251     {
252     *p_buf_len = 0;
253     *p_buf_offset = 0;
254     *p_conv_len = (int)(conv_size - out_bytes);
255    
256     break;
257     }
258     }
259    
260     return 0;
261     }
262    
263 sysadm 1.14 int bbsnet_connect(int n)
264 sysadm 1.1 {
265 sysadm 1.36 int sock, ret, loop, error;
266 sysadm 1.38 int sock_connected = 0;
267 sysadm 1.36 int flags_sock;
268     int flags_stdin;
269     int flags_stdout;
270     int len;
271 sysadm 1.14 struct sockaddr_in sin;
272 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
273     char output_buf[LINE_BUFFER_LEN];
274     int input_buf_len = 0;
275     int output_buf_len = 0;
276     int input_buf_offset = 0;
277     int output_buf_offset = 0;
278 sysadm 1.60 iconv_t input_cd = NULL;
279     char input_conv[LINE_BUFFER_LEN * 2];
280     char output_conv[LINE_BUFFER_LEN * 2];
281     int input_conv_len = 0;
282     int output_conv_len = 0;
283     int input_conv_offset = 0;
284     int output_conv_offset = 0;
285     iconv_t output_cd = NULL;
286 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
287     int nfds, epollfd;
288     int stdin_read_wait = 0;
289     int stdout_write_wait = 0;
290     int sock_read_wait = 0;
291     int sock_write_wait = 0;
292 sysadm 1.26 struct hostent *p_host = NULL;
293 sysadm 1.31 int tos;
294 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
295 sysadm 1.14 int remote_port;
296 sysadm 1.63 char local_addr[IP_ADDR_LEN];
297     int local_port;
298     socklen_t sock_len;
299 sysadm 1.56 time_t t_used = time(NULL);
300 sysadm 1.14 struct tm *tm_used;
301 sysadm 1.26 int ch;
302 sysadm 1.14
303 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
304     {
305     log_error("user_online_update(BBS_NET) error\n");
306     }
307    
308 sysadm 1.14 clearscr();
309    
310     moveto(0, 0);
311 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
312 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
313     iflush();
314    
315 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
316 sysadm 1.14
317 sysadm 1.26 if (p_host == NULL)
318 sysadm 1.1 {
319 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
320 sysadm 1.14 press_any_key();
321     return -1;
322 sysadm 1.1 }
323 sysadm 1.14
324     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
325    
326     if (sock < 0)
327 sysadm 1.1 {
328 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
329 sysadm 1.14 press_any_key();
330     return -1;
331 sysadm 1.1 }
332    
333 sysadm 1.14 sin.sin_family = AF_INET;
334 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
335 sysadm 1.14 sin.sin_port = 0;
336    
337     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
338     {
339 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
340     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
341 sysadm 1.14 return -2;
342     }
343 sysadm 1.1
344 sysadm 1.49 memset(&sin, 0, sizeof(sin));
345 sysadm 1.14 sin.sin_family = AF_INET;
346 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
347 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
348    
349 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
350     remote_addr[sizeof(remote_addr) - 1] = '\0';
351 sysadm 1.14 remote_port = ntohs(sin.sin_port);
352    
353 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
354 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
355 sysadm 1.29
356 sysadm 1.39 // Set socket as non-blocking
357     flags_sock = fcntl(sock, F_GETFL, 0);
358     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
359    
360     // Set STDIN/STDOUT as non-blocking
361     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
362     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
363     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
364     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
365    
366 sysadm 1.38 epollfd = epoll_create1(0);
367     if (epollfd < 0)
368     {
369     log_error("epoll_create1() error (%d)\n", errno);
370     return -1;
371     }
372    
373 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
374 sysadm 1.38 ev.data.fd = sock;
375     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
376     {
377     log_error("epoll_ctl(socket) error (%d)\n", errno);
378 sysadm 1.39 goto cleanup;
379 sysadm 1.38 }
380    
381 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
382 sysadm 1.38 ev.data.fd = STDIN_FILENO;
383     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
384     {
385     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
386 sysadm 1.39 goto cleanup;
387 sysadm 1.38 }
388    
389     while (!SYS_server_exit)
390 sysadm 1.29 {
391 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
392 sysadm 1.29 {
393 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
394     {
395     // Use select / epoll to check writability of the socket,
396     // then use getsockopt to check the status of the socket.
397     // See man connect(2)
398     break;
399     }
400     else if (errno == EINTR)
401     {
402     continue;
403     }
404     else
405     {
406     log_error("connect(socket) error (%d)\n", errno);
407 sysadm 1.39
408 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
409 sysadm 1.38 press_any_key();
410 sysadm 1.39
411     goto cleanup;
412 sysadm 1.38 }
413 sysadm 1.29 }
414     }
415    
416 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
417 sysadm 1.1 {
418 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
419 sysadm 1.29
420 sysadm 1.38 if (nfds < 0)
421 sysadm 1.20 {
422 sysadm 1.29 if (errno != EINTR)
423     {
424 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
425 sysadm 1.39 break;
426 sysadm 1.29 }
427 sysadm 1.20 }
428 sysadm 1.38 else if (nfds == 0) // timeout
429     {
430     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
431     }
432     else // ret > 0
433 sysadm 1.14 {
434 sysadm 1.38 for (int i = 0; i < nfds; i++)
435 sysadm 1.29 {
436 sysadm 1.38 if (events[i].data.fd == sock)
437     {
438     len = sizeof(error);
439     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
440     {
441     log_error("getsockopt() error (%d) !\n", error);
442 sysadm 1.39 goto cleanup;
443 sysadm 1.38 }
444     if (error == 0)
445     {
446     sock_connected = 1;
447     }
448     }
449     else if (events[i].data.fd == STDIN_FILENO)
450     {
451     ch = igetch(0);
452 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
453 sysadm 1.38 {
454 sysadm 1.39 goto cleanup;
455 sysadm 1.38 }
456     }
457 sysadm 1.29 }
458 sysadm 1.14 }
459 sysadm 1.12 }
460 sysadm 1.38 if (SYS_server_exit)
461     {
462 sysadm 1.39 goto cleanup;
463 sysadm 1.38 }
464     if (!sock_connected)
465 sysadm 1.12 {
466 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
467 sysadm 1.14 press_any_key();
468 sysadm 1.39
469     goto cleanup;
470 sysadm 1.12 }
471 sysadm 1.29
472 sysadm 1.31 tos = IPTOS_LOWDELAY;
473     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
474     {
475     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
476     }
477 sysadm 1.14
478 sysadm 1.63 sock_len = sizeof(sin);
479     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
480     {
481     log_error("getsockname() error: %d", errno);
482     goto cleanup;
483     }
484    
485     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
486     local_addr[sizeof(local_addr) - 1] = '\0';
487     local_port = ntohs(sin.sin_port);
488    
489 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
490 sysadm 1.33 iflush();
491 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
492     remote_addr, remote_port, local_addr, local_port, BBS_username);
493 sysadm 1.14
494 sysadm 1.62 input_cd = iconv_open(bbsnet_conf[n].charset, BBS_NET_DEFAULT_CHARSET);
495 sysadm 1.60 if (input_cd == (iconv_t)(-1))
496     {
497 sysadm 1.62 log_error("iconv_open(%s->%s) error: %d\n", BBS_NET_DEFAULT_CHARSET, bbsnet_conf[n].charset, errno);
498 sysadm 1.60 goto cleanup;
499     }
500 sysadm 1.62 output_cd = iconv_open(BBS_NET_DEFAULT_CHARSET, bbsnet_conf[n].charset);
501 sysadm 1.60 if (input_cd == (iconv_t)(-1))
502     {
503 sysadm 1.62 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, BBS_NET_DEFAULT_CHARSET, errno);
504 sysadm 1.60 iconv_close(input_cd);
505     goto cleanup;
506     }
507    
508 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
509     ev.data.fd = sock;
510     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
511     {
512     log_error("epoll_ctl(socket) error (%d)\n", errno);
513 sysadm 1.39 goto cleanup;
514 sysadm 1.38 }
515    
516 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
517 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
518     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
519     {
520     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
521 sysadm 1.39 goto cleanup;
522 sysadm 1.38 }
523    
524 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
525 sysadm 1.14 loop = 1;
526    
527 sysadm 1.26 while (loop && !SYS_server_exit)
528 sysadm 1.12 {
529 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
530     {
531     log_error("SSH channel is closed\n");
532     loop = 0;
533     break;
534     }
535    
536 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
537 sysadm 1.33
538 sysadm 1.38 if (nfds < 0)
539 sysadm 1.14 {
540 sysadm 1.38 if (errno != EINTR)
541 sysadm 1.14 {
542 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
543     break;
544 sysadm 1.14 }
545 sysadm 1.38 continue;
546 sysadm 1.14 }
547 sysadm 1.38 else if (nfds == 0) // timeout
548 sysadm 1.1 {
549 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
550 sysadm 1.28 {
551 sysadm 1.38 break;
552 sysadm 1.28 }
553 sysadm 1.1 }
554 sysadm 1.38
555     for (int i = 0; i < nfds; i++)
556 sysadm 1.1 {
557 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
558 sysadm 1.14 {
559 sysadm 1.38 stdin_read_wait = 1;
560 sysadm 1.59 }
561    
562     if (events[i].data.fd == sock)
563     {
564     if (events[i].events & EPOLLIN)
565     {
566     sock_read_wait = 1;
567     }
568     if (events[i].events & EPOLLOUT)
569     {
570     sock_write_wait = 1;
571     }
572     }
573    
574     if (events[i].data.fd == STDOUT_FILENO)
575     {
576     stdout_write_wait = 1;
577     }
578     }
579    
580     if (stdin_read_wait)
581     {
582     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
583     {
584     if (SSH_v2)
585 sysadm 1.33 {
586 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
587     if (ret == SSH_ERROR)
588 sysadm 1.47 {
589 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
590     loop = 0;
591     break;
592 sysadm 1.47 }
593 sysadm 1.59 else if (ret == SSH_EOF)
594 sysadm 1.47 {
595 sysadm 1.59 stdin_read_wait = 0;
596     loop = 0;
597     break;
598 sysadm 1.47 }
599 sysadm 1.59 else if (ret == 0)
600 sysadm 1.33 {
601 sysadm 1.59 stdin_read_wait = 0;
602     break; // Check whether channel is still open
603 sysadm 1.38 }
604 sysadm 1.59 }
605     else
606     {
607     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
608     }
609     if (ret < 0)
610     {
611     if (errno == EAGAIN || errno == EWOULDBLOCK)
612 sysadm 1.38 {
613     stdin_read_wait = 0;
614     break;
615     }
616 sysadm 1.59 else if (errno == EINTR)
617     {
618     continue;
619     }
620 sysadm 1.38 else
621     {
622 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
623     loop = 0;
624     break;
625     }
626     }
627     else if (ret == 0) // broken pipe
628     {
629     #ifdef _DEBUG
630     log_error("read(STDIN) EOF\n");
631     #endif
632     stdin_read_wait = 0;
633     loop = 0;
634     break;
635     }
636     else
637     {
638     input_buf_len += ret;
639     BBS_last_access_tm = time(NULL);
640 sysadm 1.58
641 sysadm 1.59 // Refresh current action while user input
642     if (user_online_update("BBS_NET") < 0)
643     {
644     log_error("user_online_update(BBS_NET) error\n");
645     }
646 sysadm 1.58
647 sysadm 1.59 continue;
648 sysadm 1.33 }
649 sysadm 1.36 }
650 sysadm 1.59 }
651 sysadm 1.29
652 sysadm 1.59 if (sock_write_wait)
653     {
654 sysadm 1.60 if (input_buf_offset < input_buf_len)
655 sysadm 1.36 {
656 sysadm 1.60 ret = bbsnet_io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
657     if (ret < 0)
658     {
659     log_error("bbsnet_io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
660     }
661     }
662    
663     while (input_conv_offset < input_conv_len && !SYS_server_exit)
664     {
665     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
666 sysadm 1.59 if (ret < 0)
667 sysadm 1.36 {
668 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
669 sysadm 1.36 {
670 sysadm 1.59 sock_write_wait = 0;
671     break;
672 sysadm 1.38 }
673 sysadm 1.59 else if (errno == EINTR)
674 sysadm 1.38 {
675 sysadm 1.59 continue;
676     }
677     else
678     {
679     log_error("write(socket) error (%d)\n", errno);
680 sysadm 1.36 loop = 0;
681 sysadm 1.38 break;
682     }
683 sysadm 1.59 }
684     else if (ret == 0) // broken pipe
685     {
686     #ifdef _DEBUG
687     log_error("write(socket) EOF\n");
688     #endif
689     sock_write_wait = 0;
690     loop = 0;
691     break;
692     }
693     else
694     {
695 sysadm 1.60 input_conv_offset += ret;
696     if (input_conv_offset >= input_conv_len) // Output buffer complete
697 sysadm 1.38 {
698 sysadm 1.60 input_conv_offset = 0;
699     input_conv_len = 0;
700 sysadm 1.59 break;
701 sysadm 1.36 }
702 sysadm 1.59 continue;
703 sysadm 1.36 }
704 sysadm 1.14 }
705 sysadm 1.59 }
706 sysadm 1.36
707 sysadm 1.59 if (sock_read_wait)
708     {
709     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
710 sysadm 1.14 {
711 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
712     if (ret < 0)
713 sysadm 1.14 {
714 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
715 sysadm 1.38 {
716 sysadm 1.59 sock_read_wait = 0;
717     break;
718 sysadm 1.38 }
719 sysadm 1.59 else if (errno == EINTR)
720 sysadm 1.33 {
721 sysadm 1.59 continue;
722 sysadm 1.38 }
723     else
724     {
725 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
726     loop = 0;
727     break;
728 sysadm 1.33 }
729     }
730 sysadm 1.59 else if (ret == 0) // broken pipe
731     {
732     #ifdef _DEBUG
733     log_error("read(socket) EOF\n");
734     #endif
735     sock_read_wait = 0;
736     loop = 0;
737     break;
738     }
739     else
740     {
741     output_buf_len += ret;
742     continue;
743     }
744 sysadm 1.36 }
745 sysadm 1.59 }
746 sysadm 1.36
747 sysadm 1.59 if (stdout_write_wait)
748     {
749 sysadm 1.60 if (output_buf_offset < output_buf_len)
750     {
751     ret = bbsnet_io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
752     if (ret < 0)
753     {
754     log_error("bbsnet_io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
755     }
756     }
757    
758     while (output_conv_offset < output_conv_len && !SYS_server_exit)
759 sysadm 1.36 {
760 sysadm 1.59 if (SSH_v2)
761 sysadm 1.36 {
762 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
763 sysadm 1.59 if (ret == SSH_ERROR)
764 sysadm 1.47 {
765 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
766     loop = 0;
767     break;
768 sysadm 1.47 }
769 sysadm 1.59 }
770     else
771     {
772 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
773 sysadm 1.59 }
774     if (ret < 0)
775     {
776     if (errno == EAGAIN || errno == EWOULDBLOCK)
777 sysadm 1.47 {
778 sysadm 1.59 stdout_write_wait = 0;
779     break;
780 sysadm 1.47 }
781 sysadm 1.59 else if (errno == EINTR)
782 sysadm 1.38 {
783 sysadm 1.59 continue;
784 sysadm 1.38 }
785 sysadm 1.59 else
786 sysadm 1.33 {
787 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
788 sysadm 1.36 loop = 0;
789 sysadm 1.38 break;
790     }
791 sysadm 1.59 }
792     else if (ret == 0) // broken pipe
793     {
794     #ifdef _DEBUG
795     log_error("write(STDOUT) EOF\n");
796     #endif
797     stdout_write_wait = 0;
798     loop = 0;
799     break;
800     }
801     else
802     {
803 sysadm 1.60 output_conv_offset += ret;
804     if (output_conv_offset >= output_conv_len) // Output buffer complete
805 sysadm 1.38 {
806 sysadm 1.60 output_conv_offset = 0;
807     output_conv_len = 0;
808 sysadm 1.59 break;
809 sysadm 1.36 }
810 sysadm 1.59 continue;
811 sysadm 1.36 }
812 sysadm 1.14 }
813 sysadm 1.1 }
814     }
815    
816 sysadm 1.60 iconv_close(input_cd);
817     iconv_close(output_cd);
818    
819 sysadm 1.39 cleanup:
820     if (close(epollfd) < 0)
821     {
822     log_error("close(epoll) error (%d)\n");
823     }
824    
825 sysadm 1.36 // Restore STDIN/STDOUT flags
826     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
827     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
828    
829     // Restore socket flags
830     fcntl(sock, F_SETFL, flags_sock);
831    
832 sysadm 1.14 if (close(sock) == -1)
833     {
834     log_error("Close socket failed\n");
835     }
836 sysadm 1.1
837 sysadm 1.50 t_used = time(NULL) - t_used;
838 sysadm 1.14 tm_used = gmtime(&t_used);
839 sysadm 1.8
840 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
841 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
842     tm_used->tm_sec);
843 sysadm 1.8
844 sysadm 1.14 return 0;
845 sysadm 1.1 }
846    
847     static int
848 sysadm 1.14 bbsnet_refresh()
849 sysadm 1.1 {
850 sysadm 1.14 clearscr();
851     moveto(1, 0);
852 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
853 sysadm 1.20 for (int i = 2; i < 19; i++)
854 sysadm 1.14 {
855     moveto(i, 0);
856 sysadm 1.23 prints("|");
857 sysadm 1.14 moveto(i, 79);
858 sysadm 1.23 prints("|");
859 sysadm 1.14 }
860     moveto(19, 0);
861 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
862 sysadm 1.14 moveto(22, 0);
863 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
864 sysadm 1.14 moveto(23, 0);
865 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
866 sysadm 1.13
867 sysadm 1.14 iflush();
868 sysadm 1.1
869 sysadm 1.14 return 0;
870 sysadm 1.1 }
871    
872 sysadm 1.43 int bbsnet_selchange()
873 sysadm 1.1 {
874 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
875    
876 sysadm 1.14 moveto(20, 0);
877     clrtoeol();
878 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
879 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
880 sysadm 1.14 moveto(20, 79);
881 sysadm 1.23 prints("|");
882 sysadm 1.14 moveto(21, 0);
883     clrtoeol();
884 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
885 sysadm 1.43 if (bbsnet_conf[i].port != 23)
886 sysadm 1.20 {
887 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
888 sysadm 1.20 }
889 sysadm 1.14 prints("\x1b[m");
890     moveto(21, 79);
891 sysadm 1.23 prints("|");
892 sysadm 1.14 iflush();
893 sysadm 1.1
894 sysadm 1.14 return 0;
895 sysadm 1.1 }
896    
897 sysadm 1.14 int bbs_net()
898 sysadm 1.1 {
899 sysadm 1.43 int ch, i;
900 sysadm 1.1
901 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
902 sysadm 1.1
903 sysadm 1.14 clearscr();
904     bbsnet_refresh();
905 sysadm 1.41 display_menu(&bbsnet_menu);
906 sysadm 1.43 bbsnet_selchange();
907 sysadm 1.14
908 sysadm 1.26 while (!SYS_server_exit)
909 sysadm 1.1 {
910 sysadm 1.39 ch = igetch(100);
911 sysadm 1.52
912 sysadm 1.64 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
913     {
914     BBS_last_access_tm = time(NULL);
915     }
916    
917 sysadm 1.14 switch (ch)
918     {
919 sysadm 1.47 case KEY_NULL: // broken pipe
920 sysadm 1.64 log_error("KEY_NULL\n");
921 sysadm 1.40 goto cleanup;
922 sysadm 1.14 case KEY_TIMEOUT:
923 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
924 sysadm 1.14 {
925 sysadm 1.64 log_error("User input timeout\n");
926 sysadm 1.40 goto cleanup;
927 sysadm 1.14 }
928 sysadm 1.29 continue;
929 sysadm 1.64 case KEY_ESC:
930     case Ctrl('C'): // user cancel
931     goto cleanup;
932 sysadm 1.14 case CR:
933 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
934 sysadm 1.14 bbsnet_refresh();
935 sysadm 1.41 display_menu(&bbsnet_menu);
936 sysadm 1.43 bbsnet_selchange();
937 sysadm 1.14 break;
938     case KEY_UP:
939     for (i = 0; i < STATION_PER_LINE; i++)
940 sysadm 1.20 {
941 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
942 sysadm 1.20 }
943 sysadm 1.43 bbsnet_selchange();
944 sysadm 1.14 break;
945     case KEY_DOWN:
946     for (i = 0; i < STATION_PER_LINE; i++)
947 sysadm 1.20 {
948 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
949 sysadm 1.20 }
950 sysadm 1.43 bbsnet_selchange();
951 sysadm 1.14 break;
952     case KEY_LEFT:
953     menu_control(&bbsnet_menu, KEY_UP);
954 sysadm 1.43 bbsnet_selchange();
955 sysadm 1.14 break;
956     case KEY_RIGHT:
957     menu_control(&bbsnet_menu, KEY_DOWN);
958 sysadm 1.43 bbsnet_selchange();
959     break;
960 sysadm 1.44 case KEY_HOME:
961 sysadm 1.43 case KEY_PGUP:
962     menu_control(&bbsnet_menu, KEY_PGUP);
963     bbsnet_selchange();
964 sysadm 1.14 break;
965 sysadm 1.44 case KEY_END:
966     case KEY_PGDN:
967     menu_control(&bbsnet_menu, KEY_PGDN);
968     bbsnet_selchange();
969     break;
970 sysadm 1.14 default:
971     menu_control(&bbsnet_menu, ch);
972 sysadm 1.43 bbsnet_selchange();
973 sysadm 1.14 break;
974     }
975 sysadm 1.1 }
976    
977 sysadm 1.40 cleanup:
978     unload_bbsnet_conf();
979    
980 sysadm 1.14 return 0;
981 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1