/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.75 - (hide annotations)
Sat Nov 1 15:34:45 2025 UTC (4 months, 2 weeks ago) by sysadm
Branch: MAIN
Changes since 1.74: +1 -1 lines
Content type: text/x-csrc
Fix error reported by gcc -O3

1 sysadm 1.1 /***************************************************************************
2 sysadm 1.14 bbs_net.c - description
3     -------------------
4 sysadm 1.25 Copyright : (C) 2004-2025 by Leaflet
5     Email : leaflet@leafok.com
6 sysadm 1.1 ***************************************************************************/
7    
8     /***************************************************************************
9     * *
10     * This program is free software; you can redistribute it and/or modify *
11     * it under the terms of the GNU General Public License as published by *
12 sysadm 1.25 * the Free Software Foundation; either version 3 of the License, or *
13 sysadm 1.1 * (at your option) any later version. *
14     * *
15     ***************************************************************************/
16    
17     #include "bbs.h"
18     #include "common.h"
19 sysadm 1.55 #include "io.h"
20 sysadm 1.15 #include "log.h"
21 sysadm 1.55 #include "login.h"
22     #include "menu.h"
23 sysadm 1.15 #include "screen.h"
24 sysadm 1.55 #include <errno.h>
25     #include <fcntl.h>
26     #include <netdb.h>
27     #include <stdarg.h>
28 sysadm 1.1 #include <stdio.h>
29 sysadm 1.55 #include <stdlib.h>
30 sysadm 1.29 #include <string.h>
31     #include <time.h>
32     #include <unistd.h>
33 sysadm 1.55 #include <arpa/inet.h>
34     #include <libssh/libssh.h>
35     #include <libssh/server.h>
36     #include <libssh/callbacks.h>
37     #include <netinet/in.h>
38     #include <netinet/ip.h>
39 sysadm 1.29 #include <sys/select.h>
40 sysadm 1.1 #include <sys/ioctl.h>
41     #include <sys/socket.h>
42 sysadm 1.38 #include <sys/epoll.h>
43 sysadm 1.1
44 sysadm 1.26 #define MENU_CONF_DELIM " \t\r\n"
45    
46 sysadm 1.14 #define MAX_PROCESS_BAR_LEN 30
47     #define MAXSTATION 26 * 2
48     #define STATION_PER_LINE 4
49 sysadm 1.1
50     struct _bbsnet_conf
51     {
52 sysadm 1.14 char host1[20];
53     char host2[40];
54     char ip[40];
55 sysadm 1.24 in_port_t port;
56 sysadm 1.60 char charset[20];
57 sysadm 1.1 } bbsnet_conf[MAXSTATION];
58    
59 sysadm 1.74 static MENU_SET bbsnet_menu;
60 sysadm 1.1
61 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
62 sysadm 1.1 {
63 sysadm 1.14 FILE *fp;
64     MENU *p_menu;
65 sysadm 1.41 MENU_ITEM *p_menu_item;
66     MENU_ITEM_ID menu_item_id;
67 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
68 sysadm 1.14
69     fp = fopen(file_config, "r");
70     if (fp == NULL)
71 sysadm 1.20 {
72 sysadm 1.14 return -1;
73 sysadm 1.20 }
74 sysadm 1.14
75 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
76     if (bbsnet_menu.p_menu_pool == NULL)
77     {
78     log_error("calloc(p_menu_pool) error\n");
79     return -3;
80     }
81     bbsnet_menu.menu_count = 1;
82    
83     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
84     if (bbsnet_menu.p_menu_item_pool == NULL)
85     {
86     log_error("calloc(p_menu_item_pool) error\n");
87     return -3;
88     }
89     bbsnet_menu.menu_item_count = MAXSTATION;
90    
91     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
92 sysadm 1.40
93 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
94     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
95 sysadm 1.14 p_menu->title.show = 0;
96 sysadm 1.41 p_menu->screen_show = 0;
97 sysadm 1.1
98 sysadm 1.41 menu_item_id = 0;
99     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
100 sysadm 1.14 {
101 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
102     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
103     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
104     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
105 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
106 sysadm 1.14
107 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
108 sysadm 1.18 {
109 sysadm 1.14 continue;
110 sysadm 1.18 }
111    
112 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
113     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
114     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
115     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
116     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
117     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
118     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
119 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
120     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
121 sysadm 1.14
122 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
123     if (p_menu_item == NULL)
124     {
125     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
126     return -1;
127     }
128 sysadm 1.14
129 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
130     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
131     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
132     p_menu_item->submenu = 0;
133     p_menu_item->priv = 0;
134     p_menu_item->level = 0;
135     p_menu_item->name[0] =
136     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
137     p_menu_item->name[1] = '\0';
138     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
139     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
140    
141     p_menu->items[p_menu->item_count] = menu_item_id;
142     p_menu->item_count++;
143     menu_item_id++;
144     }
145    
146     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
147     bbsnet_menu.menu_id_path[0] = 0;
148     bbsnet_menu.menu_item_pos[0] = 0;
149     bbsnet_menu.choose_step = 0;
150 sysadm 1.14
151 sysadm 1.41 fclose(fp);
152 sysadm 1.14
153     return 0;
154 sysadm 1.1 }
155    
156 sysadm 1.74 static void unload_bbsnet_conf(void)
157 sysadm 1.40 {
158 sysadm 1.41 bbsnet_menu.menu_count = 0;
159     bbsnet_menu.menu_item_count = 0;
160    
161     free(bbsnet_menu.p_menu_pool);
162     bbsnet_menu.p_menu_pool = NULL;
163     free(bbsnet_menu.p_menu_item_pool);
164     bbsnet_menu.p_menu_item_pool = NULL;
165 sysadm 1.40 }
166    
167 sysadm 1.74 static void process_bar(int n, int len)
168 sysadm 1.1 {
169 sysadm 1.27 char buf[LINE_BUFFER_LEN];
170     char buf2[LINE_BUFFER_LEN];
171    
172     if (len > LINE_BUFFER_LEN)
173     {
174     len = LINE_BUFFER_LEN - 1;
175     }
176     if (n < 0)
177     {
178     n = 0;
179     }
180     else if (n > len)
181     {
182     n = len;
183     }
184 sysadm 1.14
185     moveto(4, 0);
186 sysadm 1.23 prints(" ------------------------------ \r\n");
187 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
188 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
189 sysadm 1.27 buf2[n] = '\0';
190     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
191 sysadm 1.23 prints(" ------------------------------ \r\n");
192 sysadm 1.14 iflush();
193 sysadm 1.1 }
194    
195 sysadm 1.74 static int bbsnet_connect(int n)
196 sysadm 1.1 {
197 sysadm 1.36 int sock, ret, loop, error;
198 sysadm 1.38 int sock_connected = 0;
199 sysadm 1.36 int flags_sock;
200     int flags_stdin;
201     int flags_stdout;
202     int len;
203 sysadm 1.14 struct sockaddr_in sin;
204 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
205     char output_buf[LINE_BUFFER_LEN];
206     int input_buf_len = 0;
207     int output_buf_len = 0;
208     int input_buf_offset = 0;
209     int output_buf_offset = 0;
210 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
211     char output_conv[LINE_BUFFER_LEN * 2];
212     int input_conv_len = 0;
213     int output_conv_len = 0;
214     int input_conv_offset = 0;
215     int output_conv_offset = 0;
216 sysadm 1.67 iconv_t input_cd = NULL;
217 sysadm 1.60 iconv_t output_cd = NULL;
218 sysadm 1.68 char tocode[32];
219 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
220     int nfds, epollfd;
221     int stdin_read_wait = 0;
222     int stdout_write_wait = 0;
223     int sock_read_wait = 0;
224     int sock_write_wait = 0;
225 sysadm 1.26 struct hostent *p_host = NULL;
226 sysadm 1.31 int tos;
227 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
228 sysadm 1.14 int remote_port;
229 sysadm 1.63 char local_addr[IP_ADDR_LEN];
230     int local_port;
231     socklen_t sock_len;
232 sysadm 1.56 time_t t_used = time(NULL);
233 sysadm 1.14 struct tm *tm_used;
234 sysadm 1.26 int ch;
235 sysadm 1.14
236 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
237     {
238     log_error("user_online_update(BBS_NET) error\n");
239     }
240    
241 sysadm 1.14 clearscr();
242    
243     moveto(0, 0);
244 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
245 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
246     iflush();
247    
248 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
249 sysadm 1.14
250 sysadm 1.26 if (p_host == NULL)
251 sysadm 1.1 {
252 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
253 sysadm 1.14 press_any_key();
254     return -1;
255 sysadm 1.1 }
256 sysadm 1.14
257     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
258    
259     if (sock < 0)
260 sysadm 1.1 {
261 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
262 sysadm 1.14 press_any_key();
263     return -1;
264 sysadm 1.1 }
265    
266 sysadm 1.14 sin.sin_family = AF_INET;
267 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
268 sysadm 1.14 sin.sin_port = 0;
269    
270     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
271     {
272 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
273     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
274 sysadm 1.14 return -2;
275     }
276 sysadm 1.1
277 sysadm 1.49 memset(&sin, 0, sizeof(sin));
278 sysadm 1.14 sin.sin_family = AF_INET;
279 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
280 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
281    
282 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
283     remote_addr[sizeof(remote_addr) - 1] = '\0';
284 sysadm 1.14 remote_port = ntohs(sin.sin_port);
285    
286 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
287 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
288 sysadm 1.29
289 sysadm 1.39 // Set socket as non-blocking
290     flags_sock = fcntl(sock, F_GETFL, 0);
291     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
292    
293     // Set STDIN/STDOUT as non-blocking
294     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
295     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
296     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
297     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
298    
299 sysadm 1.38 epollfd = epoll_create1(0);
300     if (epollfd < 0)
301     {
302     log_error("epoll_create1() error (%d)\n", errno);
303     return -1;
304     }
305    
306 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
307 sysadm 1.38 ev.data.fd = sock;
308     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
309     {
310     log_error("epoll_ctl(socket) error (%d)\n", errno);
311 sysadm 1.39 goto cleanup;
312 sysadm 1.38 }
313    
314 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
315 sysadm 1.38 ev.data.fd = STDIN_FILENO;
316     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
317     {
318     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
319 sysadm 1.39 goto cleanup;
320 sysadm 1.38 }
321    
322     while (!SYS_server_exit)
323 sysadm 1.29 {
324 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
325 sysadm 1.29 {
326 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
327     {
328     // Use select / epoll to check writability of the socket,
329     // then use getsockopt to check the status of the socket.
330     // See man connect(2)
331     break;
332     }
333     else if (errno == EINTR)
334     {
335     continue;
336     }
337     else
338     {
339     log_error("connect(socket) error (%d)\n", errno);
340 sysadm 1.39
341 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
342 sysadm 1.38 press_any_key();
343 sysadm 1.39
344     goto cleanup;
345 sysadm 1.38 }
346 sysadm 1.29 }
347     }
348    
349 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
350 sysadm 1.1 {
351 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
352 sysadm 1.29
353 sysadm 1.38 if (nfds < 0)
354 sysadm 1.20 {
355 sysadm 1.29 if (errno != EINTR)
356     {
357 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
358 sysadm 1.39 break;
359 sysadm 1.29 }
360 sysadm 1.20 }
361 sysadm 1.38 else if (nfds == 0) // timeout
362     {
363     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
364     }
365     else // ret > 0
366 sysadm 1.14 {
367 sysadm 1.38 for (int i = 0; i < nfds; i++)
368 sysadm 1.29 {
369 sysadm 1.38 if (events[i].data.fd == sock)
370     {
371     len = sizeof(error);
372     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
373     {
374     log_error("getsockopt() error (%d) !\n", error);
375 sysadm 1.39 goto cleanup;
376 sysadm 1.38 }
377     if (error == 0)
378     {
379     sock_connected = 1;
380     }
381     }
382     else if (events[i].data.fd == STDIN_FILENO)
383     {
384     ch = igetch(0);
385 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
386 sysadm 1.38 {
387 sysadm 1.39 goto cleanup;
388 sysadm 1.38 }
389     }
390 sysadm 1.29 }
391 sysadm 1.14 }
392 sysadm 1.12 }
393 sysadm 1.38 if (SYS_server_exit)
394     {
395 sysadm 1.39 goto cleanup;
396 sysadm 1.38 }
397     if (!sock_connected)
398 sysadm 1.12 {
399 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
400 sysadm 1.14 press_any_key();
401 sysadm 1.39
402     goto cleanup;
403 sysadm 1.12 }
404 sysadm 1.29
405 sysadm 1.31 tos = IPTOS_LOWDELAY;
406     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
407     {
408     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
409     }
410 sysadm 1.14
411 sysadm 1.63 sock_len = sizeof(sin);
412     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
413     {
414     log_error("getsockname() error: %d", errno);
415     goto cleanup;
416     }
417    
418     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
419     local_addr[sizeof(local_addr) - 1] = '\0';
420     local_port = ntohs(sin.sin_port);
421    
422 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
423 sysadm 1.33 iflush();
424 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
425     remote_addr, remote_port, local_addr, local_port, BBS_username);
426 sysadm 1.14
427 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
428     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
429 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
430 sysadm 1.60 if (input_cd == (iconv_t)(-1))
431     {
432 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
433 sysadm 1.60 goto cleanup;
434     }
435 sysadm 1.68
436 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
437     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
438 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
439 sysadm 1.67 if (output_cd == (iconv_t)(-1))
440 sysadm 1.60 {
441 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
442 sysadm 1.60 iconv_close(input_cd);
443     goto cleanup;
444     }
445    
446 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
447     ev.data.fd = sock;
448     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
449     {
450     log_error("epoll_ctl(socket) error (%d)\n", errno);
451 sysadm 1.39 goto cleanup;
452 sysadm 1.38 }
453    
454 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
455 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
456     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
457     {
458     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
459 sysadm 1.39 goto cleanup;
460 sysadm 1.38 }
461    
462 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
463 sysadm 1.14 loop = 1;
464    
465 sysadm 1.26 while (loop && !SYS_server_exit)
466 sysadm 1.12 {
467 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
468     {
469     log_error("SSH channel is closed\n");
470     loop = 0;
471     break;
472     }
473    
474 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
475 sysadm 1.33
476 sysadm 1.38 if (nfds < 0)
477 sysadm 1.14 {
478 sysadm 1.38 if (errno != EINTR)
479 sysadm 1.14 {
480 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
481     break;
482 sysadm 1.14 }
483 sysadm 1.38 continue;
484 sysadm 1.14 }
485 sysadm 1.38 else if (nfds == 0) // timeout
486 sysadm 1.1 {
487 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
488 sysadm 1.28 {
489 sysadm 1.38 break;
490 sysadm 1.28 }
491 sysadm 1.1 }
492 sysadm 1.38
493     for (int i = 0; i < nfds; i++)
494 sysadm 1.1 {
495 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
496 sysadm 1.14 {
497 sysadm 1.38 stdin_read_wait = 1;
498 sysadm 1.59 }
499    
500     if (events[i].data.fd == sock)
501     {
502     if (events[i].events & EPOLLIN)
503     {
504     sock_read_wait = 1;
505     }
506     if (events[i].events & EPOLLOUT)
507     {
508     sock_write_wait = 1;
509     }
510     }
511    
512     if (events[i].data.fd == STDOUT_FILENO)
513     {
514     stdout_write_wait = 1;
515     }
516     }
517    
518     if (stdin_read_wait)
519     {
520     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
521     {
522     if (SSH_v2)
523 sysadm 1.33 {
524 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
525     if (ret == SSH_ERROR)
526 sysadm 1.47 {
527 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
528     loop = 0;
529     break;
530 sysadm 1.47 }
531 sysadm 1.59 else if (ret == SSH_EOF)
532 sysadm 1.47 {
533 sysadm 1.59 stdin_read_wait = 0;
534     loop = 0;
535     break;
536 sysadm 1.47 }
537 sysadm 1.59 else if (ret == 0)
538 sysadm 1.33 {
539 sysadm 1.72 // Send NO-OP to remote server
540     input_buf[input_buf_len] = '\0';
541     input_buf_len++;
542 sysadm 1.73 BBS_last_access_tm = time(NULL);
543 sysadm 1.72
544 sysadm 1.59 stdin_read_wait = 0;
545     break; // Check whether channel is still open
546 sysadm 1.38 }
547 sysadm 1.59 }
548     else
549     {
550     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
551     }
552     if (ret < 0)
553     {
554     if (errno == EAGAIN || errno == EWOULDBLOCK)
555 sysadm 1.38 {
556     stdin_read_wait = 0;
557     break;
558     }
559 sysadm 1.59 else if (errno == EINTR)
560     {
561     continue;
562     }
563 sysadm 1.38 else
564     {
565 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
566     loop = 0;
567     break;
568     }
569     }
570     else if (ret == 0) // broken pipe
571     {
572     #ifdef _DEBUG
573     log_error("read(STDIN) EOF\n");
574     #endif
575     stdin_read_wait = 0;
576     loop = 0;
577     break;
578     }
579     else
580     {
581     input_buf_len += ret;
582     BBS_last_access_tm = time(NULL);
583 sysadm 1.58
584 sysadm 1.59 // Refresh current action while user input
585     if (user_online_update("BBS_NET") < 0)
586     {
587     log_error("user_online_update(BBS_NET) error\n");
588     }
589 sysadm 1.58
590 sysadm 1.59 continue;
591 sysadm 1.33 }
592 sysadm 1.36 }
593 sysadm 1.59 }
594 sysadm 1.29
595 sysadm 1.59 if (sock_write_wait)
596     {
597 sysadm 1.60 if (input_buf_offset < input_buf_len)
598 sysadm 1.36 {
599 sysadm 1.72 // For debug
600     #ifdef _DEBUG
601     for (int j = input_buf_offset; j < input_buf_len; j++)
602     {
603     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
604     }
605     #endif
606    
607 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
608 sysadm 1.60 if (ret < 0)
609     {
610 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
611 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
612 sysadm 1.60 }
613 sysadm 1.72
614     // For debug
615     #ifdef _DEBUG
616     for (int j = input_conv_offset; j < input_conv_len; j++)
617     {
618     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
619     }
620     #endif
621 sysadm 1.60 }
622    
623     while (input_conv_offset < input_conv_len && !SYS_server_exit)
624     {
625     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
626 sysadm 1.59 if (ret < 0)
627 sysadm 1.36 {
628 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
629 sysadm 1.36 {
630 sysadm 1.59 sock_write_wait = 0;
631     break;
632 sysadm 1.38 }
633 sysadm 1.59 else if (errno == EINTR)
634 sysadm 1.38 {
635 sysadm 1.59 continue;
636     }
637     else
638     {
639     log_error("write(socket) error (%d)\n", errno);
640 sysadm 1.36 loop = 0;
641 sysadm 1.38 break;
642     }
643 sysadm 1.59 }
644     else if (ret == 0) // broken pipe
645     {
646     #ifdef _DEBUG
647     log_error("write(socket) EOF\n");
648     #endif
649     sock_write_wait = 0;
650     loop = 0;
651     break;
652     }
653     else
654     {
655 sysadm 1.60 input_conv_offset += ret;
656     if (input_conv_offset >= input_conv_len) // Output buffer complete
657 sysadm 1.38 {
658 sysadm 1.60 input_conv_offset = 0;
659     input_conv_len = 0;
660 sysadm 1.59 break;
661 sysadm 1.36 }
662 sysadm 1.59 continue;
663 sysadm 1.36 }
664 sysadm 1.14 }
665 sysadm 1.59 }
666 sysadm 1.36
667 sysadm 1.59 if (sock_read_wait)
668     {
669     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
670 sysadm 1.14 {
671 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
672     if (ret < 0)
673 sysadm 1.14 {
674 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
675 sysadm 1.38 {
676 sysadm 1.59 sock_read_wait = 0;
677     break;
678 sysadm 1.38 }
679 sysadm 1.59 else if (errno == EINTR)
680 sysadm 1.33 {
681 sysadm 1.59 continue;
682 sysadm 1.38 }
683     else
684     {
685 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
686     loop = 0;
687     break;
688 sysadm 1.33 }
689     }
690 sysadm 1.59 else if (ret == 0) // broken pipe
691     {
692     #ifdef _DEBUG
693     log_error("read(socket) EOF\n");
694     #endif
695     sock_read_wait = 0;
696     loop = 0;
697     break;
698     }
699     else
700     {
701     output_buf_len += ret;
702     continue;
703     }
704 sysadm 1.36 }
705 sysadm 1.59 }
706 sysadm 1.36
707 sysadm 1.59 if (stdout_write_wait)
708     {
709 sysadm 1.60 if (output_buf_offset < output_buf_len)
710     {
711 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
712 sysadm 1.60 if (ret < 0)
713     {
714 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
715 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
716 sysadm 1.60 }
717     }
718    
719     while (output_conv_offset < output_conv_len && !SYS_server_exit)
720 sysadm 1.36 {
721 sysadm 1.59 if (SSH_v2)
722 sysadm 1.36 {
723 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
724 sysadm 1.59 if (ret == SSH_ERROR)
725 sysadm 1.47 {
726 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
727     loop = 0;
728     break;
729 sysadm 1.47 }
730 sysadm 1.59 }
731     else
732     {
733 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
734 sysadm 1.59 }
735     if (ret < 0)
736     {
737     if (errno == EAGAIN || errno == EWOULDBLOCK)
738 sysadm 1.47 {
739 sysadm 1.59 stdout_write_wait = 0;
740     break;
741 sysadm 1.47 }
742 sysadm 1.59 else if (errno == EINTR)
743 sysadm 1.38 {
744 sysadm 1.59 continue;
745 sysadm 1.38 }
746 sysadm 1.59 else
747 sysadm 1.33 {
748 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
749 sysadm 1.36 loop = 0;
750 sysadm 1.38 break;
751     }
752 sysadm 1.59 }
753     else if (ret == 0) // broken pipe
754     {
755     #ifdef _DEBUG
756     log_error("write(STDOUT) EOF\n");
757     #endif
758     stdout_write_wait = 0;
759     loop = 0;
760     break;
761     }
762     else
763     {
764 sysadm 1.60 output_conv_offset += ret;
765     if (output_conv_offset >= output_conv_len) // Output buffer complete
766 sysadm 1.38 {
767 sysadm 1.60 output_conv_offset = 0;
768     output_conv_len = 0;
769 sysadm 1.59 break;
770 sysadm 1.36 }
771 sysadm 1.59 continue;
772 sysadm 1.36 }
773 sysadm 1.14 }
774 sysadm 1.1 }
775     }
776    
777 sysadm 1.60 iconv_close(input_cd);
778     iconv_close(output_cd);
779    
780 sysadm 1.39 cleanup:
781     if (close(epollfd) < 0)
782     {
783     log_error("close(epoll) error (%d)\n");
784     }
785    
786 sysadm 1.36 // Restore STDIN/STDOUT flags
787     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
788     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
789    
790     // Restore socket flags
791     fcntl(sock, F_SETFL, flags_sock);
792    
793 sysadm 1.14 if (close(sock) == -1)
794     {
795     log_error("Close socket failed\n");
796     }
797 sysadm 1.1
798 sysadm 1.50 t_used = time(NULL) - t_used;
799 sysadm 1.14 tm_used = gmtime(&t_used);
800 sysadm 1.8
801 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
802 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
803     tm_used->tm_sec);
804 sysadm 1.8
805 sysadm 1.72 BBS_last_access_tm = time(NULL);
806    
807 sysadm 1.14 return 0;
808 sysadm 1.1 }
809    
810 sysadm 1.74 static int bbsnet_refresh()
811 sysadm 1.1 {
812 sysadm 1.14 clearscr();
813     moveto(1, 0);
814 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
815 sysadm 1.20 for (int i = 2; i < 19; i++)
816 sysadm 1.14 {
817     moveto(i, 0);
818 sysadm 1.23 prints("|");
819 sysadm 1.14 moveto(i, 79);
820 sysadm 1.23 prints("|");
821 sysadm 1.14 }
822     moveto(19, 0);
823 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
824 sysadm 1.14 moveto(22, 0);
825 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
826 sysadm 1.14 moveto(23, 0);
827 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
828 sysadm 1.13
829 sysadm 1.14 iflush();
830 sysadm 1.1
831 sysadm 1.14 return 0;
832 sysadm 1.1 }
833    
834 sysadm 1.74 static int bbsnet_selchange()
835 sysadm 1.1 {
836 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
837    
838 sysadm 1.14 moveto(20, 0);
839     clrtoeol();
840 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
841 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
842 sysadm 1.14 moveto(20, 79);
843 sysadm 1.23 prints("|");
844 sysadm 1.14 moveto(21, 0);
845     clrtoeol();
846 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
847 sysadm 1.43 if (bbsnet_conf[i].port != 23)
848 sysadm 1.20 {
849 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
850 sysadm 1.20 }
851 sysadm 1.14 prints("\x1b[m");
852     moveto(21, 79);
853 sysadm 1.23 prints("|");
854 sysadm 1.14 iflush();
855 sysadm 1.1
856 sysadm 1.14 return 0;
857 sysadm 1.1 }
858    
859 sysadm 1.74 extern int bbs_net()
860 sysadm 1.1 {
861 sysadm 1.43 int ch, i;
862 sysadm 1.1
863 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
864 sysadm 1.1
865 sysadm 1.14 clearscr();
866     bbsnet_refresh();
867 sysadm 1.41 display_menu(&bbsnet_menu);
868 sysadm 1.43 bbsnet_selchange();
869 sysadm 1.14
870 sysadm 1.26 while (!SYS_server_exit)
871 sysadm 1.1 {
872 sysadm 1.39 ch = igetch(100);
873 sysadm 1.52
874 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
875     {
876     BBS_last_access_tm = time(NULL);
877     }
878 sysadm 1.64
879 sysadm 1.14 switch (ch)
880     {
881 sysadm 1.47 case KEY_NULL: // broken pipe
882 sysadm 1.64 log_error("KEY_NULL\n");
883 sysadm 1.40 goto cleanup;
884 sysadm 1.14 case KEY_TIMEOUT:
885 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
886 sysadm 1.14 {
887 sysadm 1.64 log_error("User input timeout\n");
888 sysadm 1.40 goto cleanup;
889 sysadm 1.14 }
890 sysadm 1.29 continue;
891 sysadm 1.64 case KEY_ESC:
892     case Ctrl('C'): // user cancel
893     goto cleanup;
894 sysadm 1.14 case CR:
895 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
896 sysadm 1.14 bbsnet_refresh();
897 sysadm 1.41 display_menu(&bbsnet_menu);
898 sysadm 1.43 bbsnet_selchange();
899 sysadm 1.14 break;
900     case KEY_UP:
901     for (i = 0; i < STATION_PER_LINE; i++)
902 sysadm 1.20 {
903 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
904 sysadm 1.20 }
905 sysadm 1.43 bbsnet_selchange();
906 sysadm 1.14 break;
907     case KEY_DOWN:
908     for (i = 0; i < STATION_PER_LINE; i++)
909 sysadm 1.20 {
910 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
911 sysadm 1.20 }
912 sysadm 1.43 bbsnet_selchange();
913 sysadm 1.14 break;
914     case KEY_LEFT:
915     menu_control(&bbsnet_menu, KEY_UP);
916 sysadm 1.43 bbsnet_selchange();
917 sysadm 1.14 break;
918     case KEY_RIGHT:
919     menu_control(&bbsnet_menu, KEY_DOWN);
920 sysadm 1.43 bbsnet_selchange();
921     break;
922 sysadm 1.44 case KEY_HOME:
923 sysadm 1.43 case KEY_PGUP:
924     menu_control(&bbsnet_menu, KEY_PGUP);
925     bbsnet_selchange();
926 sysadm 1.14 break;
927 sysadm 1.44 case KEY_END:
928     case KEY_PGDN:
929     menu_control(&bbsnet_menu, KEY_PGDN);
930     bbsnet_selchange();
931     break;
932 sysadm 1.14 default:
933     menu_control(&bbsnet_menu, ch);
934 sysadm 1.43 bbsnet_selchange();
935 sysadm 1.14 break;
936     }
937 sysadm 1.1 }
938    
939 sysadm 1.40 cleanup:
940     unload_bbsnet_conf();
941    
942 sysadm 1.14 return 0;
943 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1