/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.80 - (hide annotations)
Wed Nov 5 04:19:21 2025 UTC (4 months, 1 week ago) by sysadm
Branch: MAIN
Changes since 1.79: +7 -4 lines
Content type: text/x-csrc
Use enum / const int instead of macro define constant integers
Use const char * instead of macro define for constant strings

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9     #include "bbs.h"
10     #include "common.h"
11 sysadm 1.55 #include "io.h"
12 sysadm 1.15 #include "log.h"
13 sysadm 1.55 #include "login.h"
14     #include "menu.h"
15 sysadm 1.15 #include "screen.h"
16 sysadm 1.55 #include <errno.h>
17     #include <fcntl.h>
18     #include <netdb.h>
19     #include <stdarg.h>
20 sysadm 1.1 #include <stdio.h>
21 sysadm 1.55 #include <stdlib.h>
22 sysadm 1.29 #include <string.h>
23     #include <time.h>
24     #include <unistd.h>
25 sysadm 1.55 #include <arpa/inet.h>
26     #include <libssh/libssh.h>
27     #include <libssh/server.h>
28     #include <libssh/callbacks.h>
29     #include <netinet/in.h>
30     #include <netinet/ip.h>
31 sysadm 1.29 #include <sys/select.h>
32 sysadm 1.1 #include <sys/ioctl.h>
33     #include <sys/socket.h>
34 sysadm 1.38 #include <sys/epoll.h>
35 sysadm 1.1
36 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
37 sysadm 1.26
38 sysadm 1.80 enum _bbs_net_constant_t
39     {
40     MAX_PROCESS_BAR_LEN = 30,
41     MAXSTATION = 26 * 2,
42     STATION_PER_LINE = 4,
43     };
44 sysadm 1.1
45     struct _bbsnet_conf
46     {
47 sysadm 1.14 char host1[20];
48     char host2[40];
49     char ip[40];
50 sysadm 1.24 in_port_t port;
51 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
52 sysadm 1.1 } bbsnet_conf[MAXSTATION];
53    
54 sysadm 1.74 static MENU_SET bbsnet_menu;
55 sysadm 1.1
56 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
57 sysadm 1.1 {
58 sysadm 1.14 FILE *fp;
59     MENU *p_menu;
60 sysadm 1.41 MENU_ITEM *p_menu_item;
61     MENU_ITEM_ID menu_item_id;
62 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
63 sysadm 1.14
64     fp = fopen(file_config, "r");
65     if (fp == NULL)
66 sysadm 1.20 {
67 sysadm 1.14 return -1;
68 sysadm 1.20 }
69 sysadm 1.14
70 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
71     if (bbsnet_menu.p_menu_pool == NULL)
72     {
73     log_error("calloc(p_menu_pool) error\n");
74     return -3;
75     }
76     bbsnet_menu.menu_count = 1;
77    
78     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
79     if (bbsnet_menu.p_menu_item_pool == NULL)
80     {
81     log_error("calloc(p_menu_item_pool) error\n");
82     return -3;
83     }
84     bbsnet_menu.menu_item_count = MAXSTATION;
85    
86     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
87 sysadm 1.40
88 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
89     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
90 sysadm 1.14 p_menu->title.show = 0;
91 sysadm 1.41 p_menu->screen_show = 0;
92 sysadm 1.1
93 sysadm 1.41 menu_item_id = 0;
94     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
95 sysadm 1.14 {
96 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
97     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
98     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
99     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
100 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
101 sysadm 1.14
102 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
103 sysadm 1.18 {
104 sysadm 1.14 continue;
105 sysadm 1.18 }
106    
107 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
108     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
109     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
110     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
111     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
112     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
113     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
114 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
115     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
116 sysadm 1.14
117 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
118     if (p_menu_item == NULL)
119     {
120     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
121     return -1;
122     }
123 sysadm 1.14
124 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
125     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
126     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
127     p_menu_item->submenu = 0;
128     p_menu_item->priv = 0;
129     p_menu_item->level = 0;
130     p_menu_item->name[0] =
131     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
132     p_menu_item->name[1] = '\0';
133     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
134     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
135    
136     p_menu->items[p_menu->item_count] = menu_item_id;
137     p_menu->item_count++;
138     menu_item_id++;
139     }
140    
141     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
142     bbsnet_menu.menu_id_path[0] = 0;
143     bbsnet_menu.menu_item_pos[0] = 0;
144     bbsnet_menu.choose_step = 0;
145 sysadm 1.14
146 sysadm 1.41 fclose(fp);
147 sysadm 1.14
148     return 0;
149 sysadm 1.1 }
150    
151 sysadm 1.74 static void unload_bbsnet_conf(void)
152 sysadm 1.40 {
153 sysadm 1.41 bbsnet_menu.menu_count = 0;
154     bbsnet_menu.menu_item_count = 0;
155    
156     free(bbsnet_menu.p_menu_pool);
157     bbsnet_menu.p_menu_pool = NULL;
158     free(bbsnet_menu.p_menu_item_pool);
159     bbsnet_menu.p_menu_item_pool = NULL;
160 sysadm 1.40 }
161    
162 sysadm 1.74 static void process_bar(int n, int len)
163 sysadm 1.1 {
164 sysadm 1.27 char buf[LINE_BUFFER_LEN];
165     char buf2[LINE_BUFFER_LEN];
166    
167     if (len > LINE_BUFFER_LEN)
168     {
169     len = LINE_BUFFER_LEN - 1;
170     }
171     if (n < 0)
172     {
173     n = 0;
174     }
175     else if (n > len)
176     {
177     n = len;
178     }
179 sysadm 1.14
180     moveto(4, 0);
181 sysadm 1.23 prints(" ------------------------------ \r\n");
182 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
183 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
184 sysadm 1.27 buf2[n] = '\0';
185     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
186 sysadm 1.23 prints(" ------------------------------ \r\n");
187 sysadm 1.14 iflush();
188 sysadm 1.1 }
189    
190 sysadm 1.74 static int bbsnet_connect(int n)
191 sysadm 1.1 {
192 sysadm 1.36 int sock, ret, loop, error;
193 sysadm 1.38 int sock_connected = 0;
194 sysadm 1.36 int flags_sock;
195     int flags_stdin;
196     int flags_stdout;
197     int len;
198 sysadm 1.14 struct sockaddr_in sin;
199 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
200     char output_buf[LINE_BUFFER_LEN];
201     int input_buf_len = 0;
202     int output_buf_len = 0;
203     int input_buf_offset = 0;
204     int output_buf_offset = 0;
205 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
206     char output_conv[LINE_BUFFER_LEN * 2];
207     int input_conv_len = 0;
208     int output_conv_len = 0;
209     int input_conv_offset = 0;
210     int output_conv_offset = 0;
211 sysadm 1.67 iconv_t input_cd = NULL;
212 sysadm 1.60 iconv_t output_cd = NULL;
213 sysadm 1.68 char tocode[32];
214 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
215     int nfds, epollfd;
216     int stdin_read_wait = 0;
217     int stdout_write_wait = 0;
218     int sock_read_wait = 0;
219     int sock_write_wait = 0;
220 sysadm 1.26 struct hostent *p_host = NULL;
221 sysadm 1.31 int tos;
222 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
223 sysadm 1.14 int remote_port;
224 sysadm 1.63 char local_addr[IP_ADDR_LEN];
225     int local_port;
226     socklen_t sock_len;
227 sysadm 1.56 time_t t_used = time(NULL);
228 sysadm 1.14 struct tm *tm_used;
229 sysadm 1.26 int ch;
230 sysadm 1.14
231 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
232     {
233     log_error("user_online_update(BBS_NET) error\n");
234     }
235    
236 sysadm 1.14 clearscr();
237    
238     moveto(0, 0);
239 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
240 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
241     iflush();
242    
243 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
244 sysadm 1.14
245 sysadm 1.26 if (p_host == NULL)
246 sysadm 1.1 {
247 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
248 sysadm 1.14 press_any_key();
249     return -1;
250 sysadm 1.1 }
251 sysadm 1.14
252     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
253    
254     if (sock < 0)
255 sysadm 1.1 {
256 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
257 sysadm 1.14 press_any_key();
258     return -1;
259 sysadm 1.1 }
260    
261 sysadm 1.14 sin.sin_family = AF_INET;
262 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
263 sysadm 1.14 sin.sin_port = 0;
264    
265     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
266     {
267 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
268     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
269 sysadm 1.14 return -2;
270     }
271 sysadm 1.1
272 sysadm 1.49 memset(&sin, 0, sizeof(sin));
273 sysadm 1.14 sin.sin_family = AF_INET;
274 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
275 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
276    
277 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
278     remote_addr[sizeof(remote_addr) - 1] = '\0';
279 sysadm 1.14 remote_port = ntohs(sin.sin_port);
280    
281 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
282 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
283 sysadm 1.29
284 sysadm 1.39 // Set socket as non-blocking
285     flags_sock = fcntl(sock, F_GETFL, 0);
286     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
287    
288     // Set STDIN/STDOUT as non-blocking
289     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
290     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
291     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
292     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
293    
294 sysadm 1.38 epollfd = epoll_create1(0);
295     if (epollfd < 0)
296     {
297     log_error("epoll_create1() error (%d)\n", errno);
298     return -1;
299     }
300    
301 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
302 sysadm 1.38 ev.data.fd = sock;
303     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
304     {
305     log_error("epoll_ctl(socket) error (%d)\n", errno);
306 sysadm 1.39 goto cleanup;
307 sysadm 1.38 }
308    
309 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
310 sysadm 1.38 ev.data.fd = STDIN_FILENO;
311     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
312     {
313     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
314 sysadm 1.39 goto cleanup;
315 sysadm 1.38 }
316    
317     while (!SYS_server_exit)
318 sysadm 1.29 {
319 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
320 sysadm 1.29 {
321 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
322     {
323     // Use select / epoll to check writability of the socket,
324     // then use getsockopt to check the status of the socket.
325     // See man connect(2)
326     break;
327     }
328     else if (errno == EINTR)
329     {
330     continue;
331     }
332     else
333     {
334     log_error("connect(socket) error (%d)\n", errno);
335 sysadm 1.39
336 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
337 sysadm 1.38 press_any_key();
338 sysadm 1.39
339     goto cleanup;
340 sysadm 1.38 }
341 sysadm 1.29 }
342     }
343    
344 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
345 sysadm 1.1 {
346 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
347 sysadm 1.29
348 sysadm 1.38 if (nfds < 0)
349 sysadm 1.20 {
350 sysadm 1.29 if (errno != EINTR)
351     {
352 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
353 sysadm 1.39 break;
354 sysadm 1.29 }
355 sysadm 1.20 }
356 sysadm 1.38 else if (nfds == 0) // timeout
357     {
358     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
359     }
360     else // ret > 0
361 sysadm 1.14 {
362 sysadm 1.38 for (int i = 0; i < nfds; i++)
363 sysadm 1.29 {
364 sysadm 1.38 if (events[i].data.fd == sock)
365     {
366     len = sizeof(error);
367     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
368     {
369     log_error("getsockopt() error (%d) !\n", error);
370 sysadm 1.39 goto cleanup;
371 sysadm 1.38 }
372     if (error == 0)
373     {
374     sock_connected = 1;
375     }
376     }
377     else if (events[i].data.fd == STDIN_FILENO)
378     {
379     ch = igetch(0);
380 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
381 sysadm 1.38 {
382 sysadm 1.39 goto cleanup;
383 sysadm 1.38 }
384     }
385 sysadm 1.29 }
386 sysadm 1.14 }
387 sysadm 1.12 }
388 sysadm 1.38 if (SYS_server_exit)
389     {
390 sysadm 1.39 goto cleanup;
391 sysadm 1.38 }
392     if (!sock_connected)
393 sysadm 1.12 {
394 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
395 sysadm 1.14 press_any_key();
396 sysadm 1.39
397     goto cleanup;
398 sysadm 1.12 }
399 sysadm 1.29
400 sysadm 1.31 tos = IPTOS_LOWDELAY;
401     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
402     {
403     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
404     }
405 sysadm 1.14
406 sysadm 1.63 sock_len = sizeof(sin);
407     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
408     {
409     log_error("getsockname() error: %d", errno);
410     goto cleanup;
411     }
412    
413     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
414     local_addr[sizeof(local_addr) - 1] = '\0';
415     local_port = ntohs(sin.sin_port);
416    
417 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
418 sysadm 1.33 iflush();
419 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
420     remote_addr, remote_port, local_addr, local_port, BBS_username);
421 sysadm 1.14
422 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
423     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
424 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
425 sysadm 1.60 if (input_cd == (iconv_t)(-1))
426     {
427 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
428 sysadm 1.60 goto cleanup;
429     }
430 sysadm 1.68
431 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
432     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
433 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
434 sysadm 1.67 if (output_cd == (iconv_t)(-1))
435 sysadm 1.60 {
436 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
437 sysadm 1.60 iconv_close(input_cd);
438     goto cleanup;
439     }
440    
441 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
442     ev.data.fd = sock;
443     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
444     {
445     log_error("epoll_ctl(socket) error (%d)\n", errno);
446 sysadm 1.39 goto cleanup;
447 sysadm 1.38 }
448    
449 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
450 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
451     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
452     {
453     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
454 sysadm 1.39 goto cleanup;
455 sysadm 1.38 }
456    
457 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
458 sysadm 1.14 loop = 1;
459    
460 sysadm 1.26 while (loop && !SYS_server_exit)
461 sysadm 1.12 {
462 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
463     {
464     log_error("SSH channel is closed\n");
465     loop = 0;
466     break;
467     }
468    
469 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
470 sysadm 1.33
471 sysadm 1.38 if (nfds < 0)
472 sysadm 1.14 {
473 sysadm 1.38 if (errno != EINTR)
474 sysadm 1.14 {
475 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
476     break;
477 sysadm 1.14 }
478 sysadm 1.38 continue;
479 sysadm 1.14 }
480 sysadm 1.38 else if (nfds == 0) // timeout
481 sysadm 1.1 {
482 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
483 sysadm 1.28 {
484 sysadm 1.38 break;
485 sysadm 1.28 }
486 sysadm 1.1 }
487 sysadm 1.38
488     for (int i = 0; i < nfds; i++)
489 sysadm 1.1 {
490 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
491 sysadm 1.14 {
492 sysadm 1.38 stdin_read_wait = 1;
493 sysadm 1.59 }
494    
495     if (events[i].data.fd == sock)
496     {
497     if (events[i].events & EPOLLIN)
498     {
499     sock_read_wait = 1;
500     }
501     if (events[i].events & EPOLLOUT)
502     {
503     sock_write_wait = 1;
504     }
505     }
506    
507     if (events[i].data.fd == STDOUT_FILENO)
508     {
509     stdout_write_wait = 1;
510     }
511     }
512    
513     if (stdin_read_wait)
514     {
515     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
516     {
517     if (SSH_v2)
518 sysadm 1.33 {
519 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
520     if (ret == SSH_ERROR)
521 sysadm 1.47 {
522 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
523     loop = 0;
524     break;
525 sysadm 1.47 }
526 sysadm 1.59 else if (ret == SSH_EOF)
527 sysadm 1.47 {
528 sysadm 1.59 stdin_read_wait = 0;
529     loop = 0;
530     break;
531 sysadm 1.47 }
532 sysadm 1.59 else if (ret == 0)
533 sysadm 1.33 {
534 sysadm 1.72 // Send NO-OP to remote server
535     input_buf[input_buf_len] = '\0';
536     input_buf_len++;
537 sysadm 1.73 BBS_last_access_tm = time(NULL);
538 sysadm 1.72
539 sysadm 1.59 stdin_read_wait = 0;
540     break; // Check whether channel is still open
541 sysadm 1.38 }
542 sysadm 1.59 }
543     else
544     {
545     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
546     }
547     if (ret < 0)
548     {
549     if (errno == EAGAIN || errno == EWOULDBLOCK)
550 sysadm 1.38 {
551     stdin_read_wait = 0;
552     break;
553     }
554 sysadm 1.59 else if (errno == EINTR)
555     {
556     continue;
557     }
558 sysadm 1.38 else
559     {
560 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
561     loop = 0;
562     break;
563     }
564     }
565     else if (ret == 0) // broken pipe
566     {
567     #ifdef _DEBUG
568     log_error("read(STDIN) EOF\n");
569     #endif
570     stdin_read_wait = 0;
571     loop = 0;
572     break;
573     }
574     else
575     {
576     input_buf_len += ret;
577     BBS_last_access_tm = time(NULL);
578 sysadm 1.58
579 sysadm 1.59 // Refresh current action while user input
580     if (user_online_update("BBS_NET") < 0)
581     {
582     log_error("user_online_update(BBS_NET) error\n");
583     }
584 sysadm 1.58
585 sysadm 1.59 continue;
586 sysadm 1.33 }
587 sysadm 1.36 }
588 sysadm 1.59 }
589 sysadm 1.29
590 sysadm 1.59 if (sock_write_wait)
591     {
592 sysadm 1.60 if (input_buf_offset < input_buf_len)
593 sysadm 1.36 {
594 sysadm 1.72 // For debug
595     #ifdef _DEBUG
596     for (int j = input_buf_offset; j < input_buf_len; j++)
597     {
598     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
599     }
600     #endif
601    
602 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
603 sysadm 1.60 if (ret < 0)
604     {
605 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
606 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
607 sysadm 1.60 }
608 sysadm 1.72
609     // For debug
610     #ifdef _DEBUG
611     for (int j = input_conv_offset; j < input_conv_len; j++)
612     {
613     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
614     }
615     #endif
616 sysadm 1.60 }
617    
618     while (input_conv_offset < input_conv_len && !SYS_server_exit)
619     {
620     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
621 sysadm 1.59 if (ret < 0)
622 sysadm 1.36 {
623 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
624 sysadm 1.36 {
625 sysadm 1.59 sock_write_wait = 0;
626     break;
627 sysadm 1.38 }
628 sysadm 1.59 else if (errno == EINTR)
629 sysadm 1.38 {
630 sysadm 1.59 continue;
631     }
632     else
633     {
634     log_error("write(socket) error (%d)\n", errno);
635 sysadm 1.36 loop = 0;
636 sysadm 1.38 break;
637     }
638 sysadm 1.59 }
639     else if (ret == 0) // broken pipe
640     {
641     #ifdef _DEBUG
642     log_error("write(socket) EOF\n");
643     #endif
644     sock_write_wait = 0;
645     loop = 0;
646     break;
647     }
648     else
649     {
650 sysadm 1.60 input_conv_offset += ret;
651     if (input_conv_offset >= input_conv_len) // Output buffer complete
652 sysadm 1.38 {
653 sysadm 1.60 input_conv_offset = 0;
654     input_conv_len = 0;
655 sysadm 1.59 break;
656 sysadm 1.36 }
657 sysadm 1.59 continue;
658 sysadm 1.36 }
659 sysadm 1.14 }
660 sysadm 1.59 }
661 sysadm 1.36
662 sysadm 1.59 if (sock_read_wait)
663     {
664     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
665 sysadm 1.14 {
666 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
667     if (ret < 0)
668 sysadm 1.14 {
669 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
670 sysadm 1.38 {
671 sysadm 1.59 sock_read_wait = 0;
672     break;
673 sysadm 1.38 }
674 sysadm 1.59 else if (errno == EINTR)
675 sysadm 1.33 {
676 sysadm 1.59 continue;
677 sysadm 1.38 }
678     else
679     {
680 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
681     loop = 0;
682     break;
683 sysadm 1.33 }
684     }
685 sysadm 1.59 else if (ret == 0) // broken pipe
686     {
687     #ifdef _DEBUG
688     log_error("read(socket) EOF\n");
689     #endif
690     sock_read_wait = 0;
691     loop = 0;
692     break;
693     }
694     else
695     {
696     output_buf_len += ret;
697     continue;
698     }
699 sysadm 1.36 }
700 sysadm 1.59 }
701 sysadm 1.36
702 sysadm 1.59 if (stdout_write_wait)
703     {
704 sysadm 1.60 if (output_buf_offset < output_buf_len)
705     {
706 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
707 sysadm 1.60 if (ret < 0)
708     {
709 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
710 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
711 sysadm 1.60 }
712     }
713    
714     while (output_conv_offset < output_conv_len && !SYS_server_exit)
715 sysadm 1.36 {
716 sysadm 1.59 if (SSH_v2)
717 sysadm 1.36 {
718 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
719 sysadm 1.59 if (ret == SSH_ERROR)
720 sysadm 1.47 {
721 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
722     loop = 0;
723     break;
724 sysadm 1.47 }
725 sysadm 1.59 }
726     else
727     {
728 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
729 sysadm 1.59 }
730     if (ret < 0)
731     {
732     if (errno == EAGAIN || errno == EWOULDBLOCK)
733 sysadm 1.47 {
734 sysadm 1.59 stdout_write_wait = 0;
735     break;
736 sysadm 1.47 }
737 sysadm 1.59 else if (errno == EINTR)
738 sysadm 1.38 {
739 sysadm 1.59 continue;
740 sysadm 1.38 }
741 sysadm 1.59 else
742 sysadm 1.33 {
743 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
744 sysadm 1.36 loop = 0;
745 sysadm 1.38 break;
746     }
747 sysadm 1.59 }
748     else if (ret == 0) // broken pipe
749     {
750     #ifdef _DEBUG
751     log_error("write(STDOUT) EOF\n");
752     #endif
753     stdout_write_wait = 0;
754     loop = 0;
755     break;
756     }
757     else
758     {
759 sysadm 1.60 output_conv_offset += ret;
760     if (output_conv_offset >= output_conv_len) // Output buffer complete
761 sysadm 1.38 {
762 sysadm 1.60 output_conv_offset = 0;
763     output_conv_len = 0;
764 sysadm 1.59 break;
765 sysadm 1.36 }
766 sysadm 1.59 continue;
767 sysadm 1.36 }
768 sysadm 1.14 }
769 sysadm 1.1 }
770     }
771    
772 sysadm 1.60 iconv_close(input_cd);
773     iconv_close(output_cd);
774    
775 sysadm 1.39 cleanup:
776     if (close(epollfd) < 0)
777     {
778     log_error("close(epoll) error (%d)\n");
779     }
780    
781 sysadm 1.36 // Restore STDIN/STDOUT flags
782     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
783     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
784    
785     // Restore socket flags
786     fcntl(sock, F_SETFL, flags_sock);
787    
788 sysadm 1.14 if (close(sock) == -1)
789     {
790     log_error("Close socket failed\n");
791     }
792 sysadm 1.1
793 sysadm 1.50 t_used = time(NULL) - t_used;
794 sysadm 1.14 tm_used = gmtime(&t_used);
795 sysadm 1.8
796 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
797 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
798     tm_used->tm_sec);
799 sysadm 1.8
800 sysadm 1.72 BBS_last_access_tm = time(NULL);
801    
802 sysadm 1.14 return 0;
803 sysadm 1.1 }
804    
805 sysadm 1.74 static int bbsnet_refresh()
806 sysadm 1.1 {
807 sysadm 1.14 clearscr();
808     moveto(1, 0);
809 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
810 sysadm 1.20 for (int i = 2; i < 19; i++)
811 sysadm 1.14 {
812     moveto(i, 0);
813 sysadm 1.23 prints("|");
814 sysadm 1.14 moveto(i, 79);
815 sysadm 1.23 prints("|");
816 sysadm 1.14 }
817     moveto(19, 0);
818 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
819 sysadm 1.14 moveto(22, 0);
820 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
821 sysadm 1.14 moveto(23, 0);
822 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
823 sysadm 1.13
824 sysadm 1.14 iflush();
825 sysadm 1.1
826 sysadm 1.14 return 0;
827 sysadm 1.1 }
828    
829 sysadm 1.74 static int bbsnet_selchange()
830 sysadm 1.1 {
831 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
832    
833 sysadm 1.14 moveto(20, 0);
834     clrtoeol();
835 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
836 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
837 sysadm 1.14 moveto(20, 79);
838 sysadm 1.23 prints("|");
839 sysadm 1.14 moveto(21, 0);
840     clrtoeol();
841 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
842 sysadm 1.43 if (bbsnet_conf[i].port != 23)
843 sysadm 1.20 {
844 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
845 sysadm 1.20 }
846 sysadm 1.14 prints("\x1b[m");
847     moveto(21, 79);
848 sysadm 1.23 prints("|");
849 sysadm 1.14 iflush();
850 sysadm 1.1
851 sysadm 1.14 return 0;
852 sysadm 1.1 }
853    
854 sysadm 1.74 extern int bbs_net()
855 sysadm 1.1 {
856 sysadm 1.43 int ch, i;
857 sysadm 1.1
858 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
859 sysadm 1.1
860 sysadm 1.14 clearscr();
861     bbsnet_refresh();
862 sysadm 1.41 display_menu(&bbsnet_menu);
863 sysadm 1.43 bbsnet_selchange();
864 sysadm 1.14
865 sysadm 1.26 while (!SYS_server_exit)
866 sysadm 1.1 {
867 sysadm 1.39 ch = igetch(100);
868 sysadm 1.52
869 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
870     {
871     BBS_last_access_tm = time(NULL);
872     }
873 sysadm 1.64
874 sysadm 1.14 switch (ch)
875     {
876 sysadm 1.47 case KEY_NULL: // broken pipe
877 sysadm 1.64 log_error("KEY_NULL\n");
878 sysadm 1.40 goto cleanup;
879 sysadm 1.14 case KEY_TIMEOUT:
880 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
881 sysadm 1.14 {
882 sysadm 1.64 log_error("User input timeout\n");
883 sysadm 1.40 goto cleanup;
884 sysadm 1.14 }
885 sysadm 1.29 continue;
886 sysadm 1.64 case KEY_ESC:
887     case Ctrl('C'): // user cancel
888     goto cleanup;
889 sysadm 1.14 case CR:
890 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
891 sysadm 1.14 bbsnet_refresh();
892 sysadm 1.41 display_menu(&bbsnet_menu);
893 sysadm 1.43 bbsnet_selchange();
894 sysadm 1.14 break;
895     case KEY_UP:
896     for (i = 0; i < STATION_PER_LINE; i++)
897 sysadm 1.20 {
898 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
899 sysadm 1.20 }
900 sysadm 1.43 bbsnet_selchange();
901 sysadm 1.14 break;
902     case KEY_DOWN:
903     for (i = 0; i < STATION_PER_LINE; i++)
904 sysadm 1.20 {
905 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
906 sysadm 1.20 }
907 sysadm 1.43 bbsnet_selchange();
908 sysadm 1.14 break;
909     case KEY_LEFT:
910     menu_control(&bbsnet_menu, KEY_UP);
911 sysadm 1.43 bbsnet_selchange();
912 sysadm 1.14 break;
913     case KEY_RIGHT:
914     menu_control(&bbsnet_menu, KEY_DOWN);
915 sysadm 1.43 bbsnet_selchange();
916     break;
917 sysadm 1.44 case KEY_HOME:
918 sysadm 1.43 case KEY_PGUP:
919     menu_control(&bbsnet_menu, KEY_PGUP);
920     bbsnet_selchange();
921 sysadm 1.14 break;
922 sysadm 1.44 case KEY_END:
923     case KEY_PGDN:
924     menu_control(&bbsnet_menu, KEY_PGDN);
925     bbsnet_selchange();
926     break;
927 sysadm 1.14 default:
928     menu_control(&bbsnet_menu, ch);
929 sysadm 1.43 bbsnet_selchange();
930 sysadm 1.14 break;
931     }
932 sysadm 1.1 }
933    
934 sysadm 1.40 cleanup:
935     unload_bbsnet_conf();
936    
937 sysadm 1.14 return 0;
938 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1