/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.76 - (hide annotations)
Tue Nov 4 13:49:51 2025 UTC (4 months, 1 week ago) by sysadm
Branch: MAIN
Changes since 1.75: +7 -15 lines
Content type: text/x-csrc
Update file header information comments

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6     * Copyright (C) 2004-2025 by Leaflet <leaflet@leafok.com>
7     */
8 sysadm 1.1
9     #include "bbs.h"
10     #include "common.h"
11 sysadm 1.55 #include "io.h"
12 sysadm 1.15 #include "log.h"
13 sysadm 1.55 #include "login.h"
14     #include "menu.h"
15 sysadm 1.15 #include "screen.h"
16 sysadm 1.55 #include <errno.h>
17     #include <fcntl.h>
18     #include <netdb.h>
19     #include <stdarg.h>
20 sysadm 1.1 #include <stdio.h>
21 sysadm 1.55 #include <stdlib.h>
22 sysadm 1.29 #include <string.h>
23     #include <time.h>
24     #include <unistd.h>
25 sysadm 1.55 #include <arpa/inet.h>
26     #include <libssh/libssh.h>
27     #include <libssh/server.h>
28     #include <libssh/callbacks.h>
29     #include <netinet/in.h>
30     #include <netinet/ip.h>
31 sysadm 1.29 #include <sys/select.h>
32 sysadm 1.1 #include <sys/ioctl.h>
33     #include <sys/socket.h>
34 sysadm 1.38 #include <sys/epoll.h>
35 sysadm 1.1
36 sysadm 1.26 #define MENU_CONF_DELIM " \t\r\n"
37    
38 sysadm 1.14 #define MAX_PROCESS_BAR_LEN 30
39     #define MAXSTATION 26 * 2
40     #define STATION_PER_LINE 4
41 sysadm 1.1
42     struct _bbsnet_conf
43     {
44 sysadm 1.14 char host1[20];
45     char host2[40];
46     char ip[40];
47 sysadm 1.24 in_port_t port;
48 sysadm 1.60 char charset[20];
49 sysadm 1.1 } bbsnet_conf[MAXSTATION];
50    
51 sysadm 1.74 static MENU_SET bbsnet_menu;
52 sysadm 1.1
53 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
54 sysadm 1.1 {
55 sysadm 1.14 FILE *fp;
56     MENU *p_menu;
57 sysadm 1.41 MENU_ITEM *p_menu_item;
58     MENU_ITEM_ID menu_item_id;
59 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
60 sysadm 1.14
61     fp = fopen(file_config, "r");
62     if (fp == NULL)
63 sysadm 1.20 {
64 sysadm 1.14 return -1;
65 sysadm 1.20 }
66 sysadm 1.14
67 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
68     if (bbsnet_menu.p_menu_pool == NULL)
69     {
70     log_error("calloc(p_menu_pool) error\n");
71     return -3;
72     }
73     bbsnet_menu.menu_count = 1;
74    
75     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
76     if (bbsnet_menu.p_menu_item_pool == NULL)
77     {
78     log_error("calloc(p_menu_item_pool) error\n");
79     return -3;
80     }
81     bbsnet_menu.menu_item_count = MAXSTATION;
82    
83     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
84 sysadm 1.40
85 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
86     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
87 sysadm 1.14 p_menu->title.show = 0;
88 sysadm 1.41 p_menu->screen_show = 0;
89 sysadm 1.1
90 sysadm 1.41 menu_item_id = 0;
91     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
92 sysadm 1.14 {
93 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
94     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
95     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
96     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
97 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
98 sysadm 1.14
99 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
100 sysadm 1.18 {
101 sysadm 1.14 continue;
102 sysadm 1.18 }
103    
104 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
105     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
106     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
107     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
108     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
109     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
110     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
111 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
112     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
113 sysadm 1.14
114 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
115     if (p_menu_item == NULL)
116     {
117     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
118     return -1;
119     }
120 sysadm 1.14
121 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
122     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
123     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
124     p_menu_item->submenu = 0;
125     p_menu_item->priv = 0;
126     p_menu_item->level = 0;
127     p_menu_item->name[0] =
128     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
129     p_menu_item->name[1] = '\0';
130     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
131     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
132    
133     p_menu->items[p_menu->item_count] = menu_item_id;
134     p_menu->item_count++;
135     menu_item_id++;
136     }
137    
138     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
139     bbsnet_menu.menu_id_path[0] = 0;
140     bbsnet_menu.menu_item_pos[0] = 0;
141     bbsnet_menu.choose_step = 0;
142 sysadm 1.14
143 sysadm 1.41 fclose(fp);
144 sysadm 1.14
145     return 0;
146 sysadm 1.1 }
147    
148 sysadm 1.74 static void unload_bbsnet_conf(void)
149 sysadm 1.40 {
150 sysadm 1.41 bbsnet_menu.menu_count = 0;
151     bbsnet_menu.menu_item_count = 0;
152    
153     free(bbsnet_menu.p_menu_pool);
154     bbsnet_menu.p_menu_pool = NULL;
155     free(bbsnet_menu.p_menu_item_pool);
156     bbsnet_menu.p_menu_item_pool = NULL;
157 sysadm 1.40 }
158    
159 sysadm 1.74 static void process_bar(int n, int len)
160 sysadm 1.1 {
161 sysadm 1.27 char buf[LINE_BUFFER_LEN];
162     char buf2[LINE_BUFFER_LEN];
163    
164     if (len > LINE_BUFFER_LEN)
165     {
166     len = LINE_BUFFER_LEN - 1;
167     }
168     if (n < 0)
169     {
170     n = 0;
171     }
172     else if (n > len)
173     {
174     n = len;
175     }
176 sysadm 1.14
177     moveto(4, 0);
178 sysadm 1.23 prints(" ------------------------------ \r\n");
179 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
180 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
181 sysadm 1.27 buf2[n] = '\0';
182     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
183 sysadm 1.23 prints(" ------------------------------ \r\n");
184 sysadm 1.14 iflush();
185 sysadm 1.1 }
186    
187 sysadm 1.74 static int bbsnet_connect(int n)
188 sysadm 1.1 {
189 sysadm 1.36 int sock, ret, loop, error;
190 sysadm 1.38 int sock_connected = 0;
191 sysadm 1.36 int flags_sock;
192     int flags_stdin;
193     int flags_stdout;
194     int len;
195 sysadm 1.14 struct sockaddr_in sin;
196 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
197     char output_buf[LINE_BUFFER_LEN];
198     int input_buf_len = 0;
199     int output_buf_len = 0;
200     int input_buf_offset = 0;
201     int output_buf_offset = 0;
202 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
203     char output_conv[LINE_BUFFER_LEN * 2];
204     int input_conv_len = 0;
205     int output_conv_len = 0;
206     int input_conv_offset = 0;
207     int output_conv_offset = 0;
208 sysadm 1.67 iconv_t input_cd = NULL;
209 sysadm 1.60 iconv_t output_cd = NULL;
210 sysadm 1.68 char tocode[32];
211 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
212     int nfds, epollfd;
213     int stdin_read_wait = 0;
214     int stdout_write_wait = 0;
215     int sock_read_wait = 0;
216     int sock_write_wait = 0;
217 sysadm 1.26 struct hostent *p_host = NULL;
218 sysadm 1.31 int tos;
219 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
220 sysadm 1.14 int remote_port;
221 sysadm 1.63 char local_addr[IP_ADDR_LEN];
222     int local_port;
223     socklen_t sock_len;
224 sysadm 1.56 time_t t_used = time(NULL);
225 sysadm 1.14 struct tm *tm_used;
226 sysadm 1.26 int ch;
227 sysadm 1.14
228 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
229     {
230     log_error("user_online_update(BBS_NET) error\n");
231     }
232    
233 sysadm 1.14 clearscr();
234    
235     moveto(0, 0);
236 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
237 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
238     iflush();
239    
240 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
241 sysadm 1.14
242 sysadm 1.26 if (p_host == NULL)
243 sysadm 1.1 {
244 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
245 sysadm 1.14 press_any_key();
246     return -1;
247 sysadm 1.1 }
248 sysadm 1.14
249     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
250    
251     if (sock < 0)
252 sysadm 1.1 {
253 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
254 sysadm 1.14 press_any_key();
255     return -1;
256 sysadm 1.1 }
257    
258 sysadm 1.14 sin.sin_family = AF_INET;
259 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
260 sysadm 1.14 sin.sin_port = 0;
261    
262     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
263     {
264 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
265     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
266 sysadm 1.14 return -2;
267     }
268 sysadm 1.1
269 sysadm 1.49 memset(&sin, 0, sizeof(sin));
270 sysadm 1.14 sin.sin_family = AF_INET;
271 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
272 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
273    
274 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
275     remote_addr[sizeof(remote_addr) - 1] = '\0';
276 sysadm 1.14 remote_port = ntohs(sin.sin_port);
277    
278 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
279 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
280 sysadm 1.29
281 sysadm 1.39 // Set socket as non-blocking
282     flags_sock = fcntl(sock, F_GETFL, 0);
283     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
284    
285     // Set STDIN/STDOUT as non-blocking
286     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
287     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
288     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
289     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
290    
291 sysadm 1.38 epollfd = epoll_create1(0);
292     if (epollfd < 0)
293     {
294     log_error("epoll_create1() error (%d)\n", errno);
295     return -1;
296     }
297    
298 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
299 sysadm 1.38 ev.data.fd = sock;
300     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
301     {
302     log_error("epoll_ctl(socket) error (%d)\n", errno);
303 sysadm 1.39 goto cleanup;
304 sysadm 1.38 }
305    
306 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
307 sysadm 1.38 ev.data.fd = STDIN_FILENO;
308     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
309     {
310     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
311 sysadm 1.39 goto cleanup;
312 sysadm 1.38 }
313    
314     while (!SYS_server_exit)
315 sysadm 1.29 {
316 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
317 sysadm 1.29 {
318 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
319     {
320     // Use select / epoll to check writability of the socket,
321     // then use getsockopt to check the status of the socket.
322     // See man connect(2)
323     break;
324     }
325     else if (errno == EINTR)
326     {
327     continue;
328     }
329     else
330     {
331     log_error("connect(socket) error (%d)\n", errno);
332 sysadm 1.39
333 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
334 sysadm 1.38 press_any_key();
335 sysadm 1.39
336     goto cleanup;
337 sysadm 1.38 }
338 sysadm 1.29 }
339     }
340    
341 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
342 sysadm 1.1 {
343 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
344 sysadm 1.29
345 sysadm 1.38 if (nfds < 0)
346 sysadm 1.20 {
347 sysadm 1.29 if (errno != EINTR)
348     {
349 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
350 sysadm 1.39 break;
351 sysadm 1.29 }
352 sysadm 1.20 }
353 sysadm 1.38 else if (nfds == 0) // timeout
354     {
355     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
356     }
357     else // ret > 0
358 sysadm 1.14 {
359 sysadm 1.38 for (int i = 0; i < nfds; i++)
360 sysadm 1.29 {
361 sysadm 1.38 if (events[i].data.fd == sock)
362     {
363     len = sizeof(error);
364     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
365     {
366     log_error("getsockopt() error (%d) !\n", error);
367 sysadm 1.39 goto cleanup;
368 sysadm 1.38 }
369     if (error == 0)
370     {
371     sock_connected = 1;
372     }
373     }
374     else if (events[i].data.fd == STDIN_FILENO)
375     {
376     ch = igetch(0);
377 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
378 sysadm 1.38 {
379 sysadm 1.39 goto cleanup;
380 sysadm 1.38 }
381     }
382 sysadm 1.29 }
383 sysadm 1.14 }
384 sysadm 1.12 }
385 sysadm 1.38 if (SYS_server_exit)
386     {
387 sysadm 1.39 goto cleanup;
388 sysadm 1.38 }
389     if (!sock_connected)
390 sysadm 1.12 {
391 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
392 sysadm 1.14 press_any_key();
393 sysadm 1.39
394     goto cleanup;
395 sysadm 1.12 }
396 sysadm 1.29
397 sysadm 1.31 tos = IPTOS_LOWDELAY;
398     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
399     {
400     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
401     }
402 sysadm 1.14
403 sysadm 1.63 sock_len = sizeof(sin);
404     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
405     {
406     log_error("getsockname() error: %d", errno);
407     goto cleanup;
408     }
409    
410     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
411     local_addr[sizeof(local_addr) - 1] = '\0';
412     local_port = ntohs(sin.sin_port);
413    
414 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
415 sysadm 1.33 iflush();
416 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
417     remote_addr, remote_port, local_addr, local_port, BBS_username);
418 sysadm 1.14
419 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
420     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
421 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
422 sysadm 1.60 if (input_cd == (iconv_t)(-1))
423     {
424 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
425 sysadm 1.60 goto cleanup;
426     }
427 sysadm 1.68
428 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
429     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
430 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
431 sysadm 1.67 if (output_cd == (iconv_t)(-1))
432 sysadm 1.60 {
433 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
434 sysadm 1.60 iconv_close(input_cd);
435     goto cleanup;
436     }
437    
438 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
439     ev.data.fd = sock;
440     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
441     {
442     log_error("epoll_ctl(socket) error (%d)\n", errno);
443 sysadm 1.39 goto cleanup;
444 sysadm 1.38 }
445    
446 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
447 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
448     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
449     {
450     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
451 sysadm 1.39 goto cleanup;
452 sysadm 1.38 }
453    
454 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
455 sysadm 1.14 loop = 1;
456    
457 sysadm 1.26 while (loop && !SYS_server_exit)
458 sysadm 1.12 {
459 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
460     {
461     log_error("SSH channel is closed\n");
462     loop = 0;
463     break;
464     }
465    
466 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
467 sysadm 1.33
468 sysadm 1.38 if (nfds < 0)
469 sysadm 1.14 {
470 sysadm 1.38 if (errno != EINTR)
471 sysadm 1.14 {
472 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
473     break;
474 sysadm 1.14 }
475 sysadm 1.38 continue;
476 sysadm 1.14 }
477 sysadm 1.38 else if (nfds == 0) // timeout
478 sysadm 1.1 {
479 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
480 sysadm 1.28 {
481 sysadm 1.38 break;
482 sysadm 1.28 }
483 sysadm 1.1 }
484 sysadm 1.38
485     for (int i = 0; i < nfds; i++)
486 sysadm 1.1 {
487 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
488 sysadm 1.14 {
489 sysadm 1.38 stdin_read_wait = 1;
490 sysadm 1.59 }
491    
492     if (events[i].data.fd == sock)
493     {
494     if (events[i].events & EPOLLIN)
495     {
496     sock_read_wait = 1;
497     }
498     if (events[i].events & EPOLLOUT)
499     {
500     sock_write_wait = 1;
501     }
502     }
503    
504     if (events[i].data.fd == STDOUT_FILENO)
505     {
506     stdout_write_wait = 1;
507     }
508     }
509    
510     if (stdin_read_wait)
511     {
512     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
513     {
514     if (SSH_v2)
515 sysadm 1.33 {
516 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
517     if (ret == SSH_ERROR)
518 sysadm 1.47 {
519 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
520     loop = 0;
521     break;
522 sysadm 1.47 }
523 sysadm 1.59 else if (ret == SSH_EOF)
524 sysadm 1.47 {
525 sysadm 1.59 stdin_read_wait = 0;
526     loop = 0;
527     break;
528 sysadm 1.47 }
529 sysadm 1.59 else if (ret == 0)
530 sysadm 1.33 {
531 sysadm 1.72 // Send NO-OP to remote server
532     input_buf[input_buf_len] = '\0';
533     input_buf_len++;
534 sysadm 1.73 BBS_last_access_tm = time(NULL);
535 sysadm 1.72
536 sysadm 1.59 stdin_read_wait = 0;
537     break; // Check whether channel is still open
538 sysadm 1.38 }
539 sysadm 1.59 }
540     else
541     {
542     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
543     }
544     if (ret < 0)
545     {
546     if (errno == EAGAIN || errno == EWOULDBLOCK)
547 sysadm 1.38 {
548     stdin_read_wait = 0;
549     break;
550     }
551 sysadm 1.59 else if (errno == EINTR)
552     {
553     continue;
554     }
555 sysadm 1.38 else
556     {
557 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
558     loop = 0;
559     break;
560     }
561     }
562     else if (ret == 0) // broken pipe
563     {
564     #ifdef _DEBUG
565     log_error("read(STDIN) EOF\n");
566     #endif
567     stdin_read_wait = 0;
568     loop = 0;
569     break;
570     }
571     else
572     {
573     input_buf_len += ret;
574     BBS_last_access_tm = time(NULL);
575 sysadm 1.58
576 sysadm 1.59 // Refresh current action while user input
577     if (user_online_update("BBS_NET") < 0)
578     {
579     log_error("user_online_update(BBS_NET) error\n");
580     }
581 sysadm 1.58
582 sysadm 1.59 continue;
583 sysadm 1.33 }
584 sysadm 1.36 }
585 sysadm 1.59 }
586 sysadm 1.29
587 sysadm 1.59 if (sock_write_wait)
588     {
589 sysadm 1.60 if (input_buf_offset < input_buf_len)
590 sysadm 1.36 {
591 sysadm 1.72 // For debug
592     #ifdef _DEBUG
593     for (int j = input_buf_offset; j < input_buf_len; j++)
594     {
595     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
596     }
597     #endif
598    
599 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
600 sysadm 1.60 if (ret < 0)
601     {
602 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
603 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
604 sysadm 1.60 }
605 sysadm 1.72
606     // For debug
607     #ifdef _DEBUG
608     for (int j = input_conv_offset; j < input_conv_len; j++)
609     {
610     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
611     }
612     #endif
613 sysadm 1.60 }
614    
615     while (input_conv_offset < input_conv_len && !SYS_server_exit)
616     {
617     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
618 sysadm 1.59 if (ret < 0)
619 sysadm 1.36 {
620 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
621 sysadm 1.36 {
622 sysadm 1.59 sock_write_wait = 0;
623     break;
624 sysadm 1.38 }
625 sysadm 1.59 else if (errno == EINTR)
626 sysadm 1.38 {
627 sysadm 1.59 continue;
628     }
629     else
630     {
631     log_error("write(socket) error (%d)\n", errno);
632 sysadm 1.36 loop = 0;
633 sysadm 1.38 break;
634     }
635 sysadm 1.59 }
636     else if (ret == 0) // broken pipe
637     {
638     #ifdef _DEBUG
639     log_error("write(socket) EOF\n");
640     #endif
641     sock_write_wait = 0;
642     loop = 0;
643     break;
644     }
645     else
646     {
647 sysadm 1.60 input_conv_offset += ret;
648     if (input_conv_offset >= input_conv_len) // Output buffer complete
649 sysadm 1.38 {
650 sysadm 1.60 input_conv_offset = 0;
651     input_conv_len = 0;
652 sysadm 1.59 break;
653 sysadm 1.36 }
654 sysadm 1.59 continue;
655 sysadm 1.36 }
656 sysadm 1.14 }
657 sysadm 1.59 }
658 sysadm 1.36
659 sysadm 1.59 if (sock_read_wait)
660     {
661     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
662 sysadm 1.14 {
663 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
664     if (ret < 0)
665 sysadm 1.14 {
666 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
667 sysadm 1.38 {
668 sysadm 1.59 sock_read_wait = 0;
669     break;
670 sysadm 1.38 }
671 sysadm 1.59 else if (errno == EINTR)
672 sysadm 1.33 {
673 sysadm 1.59 continue;
674 sysadm 1.38 }
675     else
676     {
677 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
678     loop = 0;
679     break;
680 sysadm 1.33 }
681     }
682 sysadm 1.59 else if (ret == 0) // broken pipe
683     {
684     #ifdef _DEBUG
685     log_error("read(socket) EOF\n");
686     #endif
687     sock_read_wait = 0;
688     loop = 0;
689     break;
690     }
691     else
692     {
693     output_buf_len += ret;
694     continue;
695     }
696 sysadm 1.36 }
697 sysadm 1.59 }
698 sysadm 1.36
699 sysadm 1.59 if (stdout_write_wait)
700     {
701 sysadm 1.60 if (output_buf_offset < output_buf_len)
702     {
703 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
704 sysadm 1.60 if (ret < 0)
705     {
706 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
707 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
708 sysadm 1.60 }
709     }
710    
711     while (output_conv_offset < output_conv_len && !SYS_server_exit)
712 sysadm 1.36 {
713 sysadm 1.59 if (SSH_v2)
714 sysadm 1.36 {
715 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
716 sysadm 1.59 if (ret == SSH_ERROR)
717 sysadm 1.47 {
718 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
719     loop = 0;
720     break;
721 sysadm 1.47 }
722 sysadm 1.59 }
723     else
724     {
725 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
726 sysadm 1.59 }
727     if (ret < 0)
728     {
729     if (errno == EAGAIN || errno == EWOULDBLOCK)
730 sysadm 1.47 {
731 sysadm 1.59 stdout_write_wait = 0;
732     break;
733 sysadm 1.47 }
734 sysadm 1.59 else if (errno == EINTR)
735 sysadm 1.38 {
736 sysadm 1.59 continue;
737 sysadm 1.38 }
738 sysadm 1.59 else
739 sysadm 1.33 {
740 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
741 sysadm 1.36 loop = 0;
742 sysadm 1.38 break;
743     }
744 sysadm 1.59 }
745     else if (ret == 0) // broken pipe
746     {
747     #ifdef _DEBUG
748     log_error("write(STDOUT) EOF\n");
749     #endif
750     stdout_write_wait = 0;
751     loop = 0;
752     break;
753     }
754     else
755     {
756 sysadm 1.60 output_conv_offset += ret;
757     if (output_conv_offset >= output_conv_len) // Output buffer complete
758 sysadm 1.38 {
759 sysadm 1.60 output_conv_offset = 0;
760     output_conv_len = 0;
761 sysadm 1.59 break;
762 sysadm 1.36 }
763 sysadm 1.59 continue;
764 sysadm 1.36 }
765 sysadm 1.14 }
766 sysadm 1.1 }
767     }
768    
769 sysadm 1.60 iconv_close(input_cd);
770     iconv_close(output_cd);
771    
772 sysadm 1.39 cleanup:
773     if (close(epollfd) < 0)
774     {
775     log_error("close(epoll) error (%d)\n");
776     }
777    
778 sysadm 1.36 // Restore STDIN/STDOUT flags
779     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
780     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
781    
782     // Restore socket flags
783     fcntl(sock, F_SETFL, flags_sock);
784    
785 sysadm 1.14 if (close(sock) == -1)
786     {
787     log_error("Close socket failed\n");
788     }
789 sysadm 1.1
790 sysadm 1.50 t_used = time(NULL) - t_used;
791 sysadm 1.14 tm_used = gmtime(&t_used);
792 sysadm 1.8
793 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
794 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
795     tm_used->tm_sec);
796 sysadm 1.8
797 sysadm 1.72 BBS_last_access_tm = time(NULL);
798    
799 sysadm 1.14 return 0;
800 sysadm 1.1 }
801    
802 sysadm 1.74 static int bbsnet_refresh()
803 sysadm 1.1 {
804 sysadm 1.14 clearscr();
805     moveto(1, 0);
806 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
807 sysadm 1.20 for (int i = 2; i < 19; i++)
808 sysadm 1.14 {
809     moveto(i, 0);
810 sysadm 1.23 prints("|");
811 sysadm 1.14 moveto(i, 79);
812 sysadm 1.23 prints("|");
813 sysadm 1.14 }
814     moveto(19, 0);
815 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
816 sysadm 1.14 moveto(22, 0);
817 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
818 sysadm 1.14 moveto(23, 0);
819 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
820 sysadm 1.13
821 sysadm 1.14 iflush();
822 sysadm 1.1
823 sysadm 1.14 return 0;
824 sysadm 1.1 }
825    
826 sysadm 1.74 static int bbsnet_selchange()
827 sysadm 1.1 {
828 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
829    
830 sysadm 1.14 moveto(20, 0);
831     clrtoeol();
832 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
833 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
834 sysadm 1.14 moveto(20, 79);
835 sysadm 1.23 prints("|");
836 sysadm 1.14 moveto(21, 0);
837     clrtoeol();
838 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
839 sysadm 1.43 if (bbsnet_conf[i].port != 23)
840 sysadm 1.20 {
841 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
842 sysadm 1.20 }
843 sysadm 1.14 prints("\x1b[m");
844     moveto(21, 79);
845 sysadm 1.23 prints("|");
846 sysadm 1.14 iflush();
847 sysadm 1.1
848 sysadm 1.14 return 0;
849 sysadm 1.1 }
850    
851 sysadm 1.74 extern int bbs_net()
852 sysadm 1.1 {
853 sysadm 1.43 int ch, i;
854 sysadm 1.1
855 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
856 sysadm 1.1
857 sysadm 1.14 clearscr();
858     bbsnet_refresh();
859 sysadm 1.41 display_menu(&bbsnet_menu);
860 sysadm 1.43 bbsnet_selchange();
861 sysadm 1.14
862 sysadm 1.26 while (!SYS_server_exit)
863 sysadm 1.1 {
864 sysadm 1.39 ch = igetch(100);
865 sysadm 1.52
866 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
867     {
868     BBS_last_access_tm = time(NULL);
869     }
870 sysadm 1.64
871 sysadm 1.14 switch (ch)
872     {
873 sysadm 1.47 case KEY_NULL: // broken pipe
874 sysadm 1.64 log_error("KEY_NULL\n");
875 sysadm 1.40 goto cleanup;
876 sysadm 1.14 case KEY_TIMEOUT:
877 sysadm 1.50 if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME)
878 sysadm 1.14 {
879 sysadm 1.64 log_error("User input timeout\n");
880 sysadm 1.40 goto cleanup;
881 sysadm 1.14 }
882 sysadm 1.29 continue;
883 sysadm 1.64 case KEY_ESC:
884     case Ctrl('C'): // user cancel
885     goto cleanup;
886 sysadm 1.14 case CR:
887 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
888 sysadm 1.14 bbsnet_refresh();
889 sysadm 1.41 display_menu(&bbsnet_menu);
890 sysadm 1.43 bbsnet_selchange();
891 sysadm 1.14 break;
892     case KEY_UP:
893     for (i = 0; i < STATION_PER_LINE; i++)
894 sysadm 1.20 {
895 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
896 sysadm 1.20 }
897 sysadm 1.43 bbsnet_selchange();
898 sysadm 1.14 break;
899     case KEY_DOWN:
900     for (i = 0; i < STATION_PER_LINE; i++)
901 sysadm 1.20 {
902 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
903 sysadm 1.20 }
904 sysadm 1.43 bbsnet_selchange();
905 sysadm 1.14 break;
906     case KEY_LEFT:
907     menu_control(&bbsnet_menu, KEY_UP);
908 sysadm 1.43 bbsnet_selchange();
909 sysadm 1.14 break;
910     case KEY_RIGHT:
911     menu_control(&bbsnet_menu, KEY_DOWN);
912 sysadm 1.43 bbsnet_selchange();
913     break;
914 sysadm 1.44 case KEY_HOME:
915 sysadm 1.43 case KEY_PGUP:
916     menu_control(&bbsnet_menu, KEY_PGUP);
917     bbsnet_selchange();
918 sysadm 1.14 break;
919 sysadm 1.44 case KEY_END:
920     case KEY_PGDN:
921     menu_control(&bbsnet_menu, KEY_PGDN);
922     bbsnet_selchange();
923     break;
924 sysadm 1.14 default:
925     menu_control(&bbsnet_menu, ch);
926 sysadm 1.43 bbsnet_selchange();
927 sysadm 1.14 break;
928     }
929 sysadm 1.1 }
930    
931 sysadm 1.40 cleanup:
932     unload_bbsnet_conf();
933    
934 sysadm 1.14 return 0;
935 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1