/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.81 - (hide annotations)
Tue Nov 11 00:28:05 2025 UTC (4 months ago) by sysadm
Branch: MAIN
Changes since 1.80: +4 -0 lines
Content type: text/x-csrc
Use config.h

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14     #include "common.h"
15 sysadm 1.55 #include "io.h"
16 sysadm 1.15 #include "log.h"
17 sysadm 1.55 #include "login.h"
18     #include "menu.h"
19 sysadm 1.15 #include "screen.h"
20 sysadm 1.55 #include <errno.h>
21     #include <fcntl.h>
22     #include <netdb.h>
23     #include <stdarg.h>
24 sysadm 1.1 #include <stdio.h>
25 sysadm 1.55 #include <stdlib.h>
26 sysadm 1.29 #include <string.h>
27     #include <time.h>
28     #include <unistd.h>
29 sysadm 1.55 #include <arpa/inet.h>
30     #include <libssh/libssh.h>
31     #include <libssh/server.h>
32     #include <libssh/callbacks.h>
33     #include <netinet/in.h>
34     #include <netinet/ip.h>
35 sysadm 1.29 #include <sys/select.h>
36 sysadm 1.1 #include <sys/ioctl.h>
37     #include <sys/socket.h>
38 sysadm 1.38 #include <sys/epoll.h>
39 sysadm 1.1
40 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
41 sysadm 1.26
42 sysadm 1.80 enum _bbs_net_constant_t
43     {
44     MAX_PROCESS_BAR_LEN = 30,
45     MAXSTATION = 26 * 2,
46     STATION_PER_LINE = 4,
47     };
48 sysadm 1.1
49     struct _bbsnet_conf
50     {
51 sysadm 1.14 char host1[20];
52     char host2[40];
53     char ip[40];
54 sysadm 1.24 in_port_t port;
55 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
56 sysadm 1.1 } bbsnet_conf[MAXSTATION];
57    
58 sysadm 1.74 static MENU_SET bbsnet_menu;
59 sysadm 1.1
60 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
61 sysadm 1.1 {
62 sysadm 1.14 FILE *fp;
63     MENU *p_menu;
64 sysadm 1.41 MENU_ITEM *p_menu_item;
65     MENU_ITEM_ID menu_item_id;
66 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
67 sysadm 1.14
68     fp = fopen(file_config, "r");
69     if (fp == NULL)
70 sysadm 1.20 {
71 sysadm 1.14 return -1;
72 sysadm 1.20 }
73 sysadm 1.14
74 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
75     if (bbsnet_menu.p_menu_pool == NULL)
76     {
77     log_error("calloc(p_menu_pool) error\n");
78     return -3;
79     }
80     bbsnet_menu.menu_count = 1;
81    
82     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
83     if (bbsnet_menu.p_menu_item_pool == NULL)
84     {
85     log_error("calloc(p_menu_item_pool) error\n");
86     return -3;
87     }
88     bbsnet_menu.menu_item_count = MAXSTATION;
89    
90     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
91 sysadm 1.40
92 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
93     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
94 sysadm 1.14 p_menu->title.show = 0;
95 sysadm 1.41 p_menu->screen_show = 0;
96 sysadm 1.1
97 sysadm 1.41 menu_item_id = 0;
98     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
99 sysadm 1.14 {
100 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
101     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
102     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
103     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
104 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
105 sysadm 1.14
106 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
107 sysadm 1.18 {
108 sysadm 1.14 continue;
109 sysadm 1.18 }
110    
111 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
112     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
113     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
114     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
115     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
116     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
117     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
118 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
119     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
120 sysadm 1.14
121 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
122     if (p_menu_item == NULL)
123     {
124     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
125     return -1;
126     }
127 sysadm 1.14
128 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
129     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
130     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
131     p_menu_item->submenu = 0;
132     p_menu_item->priv = 0;
133     p_menu_item->level = 0;
134     p_menu_item->name[0] =
135     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
136     p_menu_item->name[1] = '\0';
137     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
138     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
139    
140     p_menu->items[p_menu->item_count] = menu_item_id;
141     p_menu->item_count++;
142     menu_item_id++;
143     }
144    
145     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
146     bbsnet_menu.menu_id_path[0] = 0;
147     bbsnet_menu.menu_item_pos[0] = 0;
148     bbsnet_menu.choose_step = 0;
149 sysadm 1.14
150 sysadm 1.41 fclose(fp);
151 sysadm 1.14
152     return 0;
153 sysadm 1.1 }
154    
155 sysadm 1.74 static void unload_bbsnet_conf(void)
156 sysadm 1.40 {
157 sysadm 1.41 bbsnet_menu.menu_count = 0;
158     bbsnet_menu.menu_item_count = 0;
159    
160     free(bbsnet_menu.p_menu_pool);
161     bbsnet_menu.p_menu_pool = NULL;
162     free(bbsnet_menu.p_menu_item_pool);
163     bbsnet_menu.p_menu_item_pool = NULL;
164 sysadm 1.40 }
165    
166 sysadm 1.74 static void process_bar(int n, int len)
167 sysadm 1.1 {
168 sysadm 1.27 char buf[LINE_BUFFER_LEN];
169     char buf2[LINE_BUFFER_LEN];
170    
171     if (len > LINE_BUFFER_LEN)
172     {
173     len = LINE_BUFFER_LEN - 1;
174     }
175     if (n < 0)
176     {
177     n = 0;
178     }
179     else if (n > len)
180     {
181     n = len;
182     }
183 sysadm 1.14
184     moveto(4, 0);
185 sysadm 1.23 prints(" ------------------------------ \r\n");
186 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
187 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
188 sysadm 1.27 buf2[n] = '\0';
189     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
190 sysadm 1.23 prints(" ------------------------------ \r\n");
191 sysadm 1.14 iflush();
192 sysadm 1.1 }
193    
194 sysadm 1.74 static int bbsnet_connect(int n)
195 sysadm 1.1 {
196 sysadm 1.36 int sock, ret, loop, error;
197 sysadm 1.38 int sock_connected = 0;
198 sysadm 1.36 int flags_sock;
199     int flags_stdin;
200     int flags_stdout;
201     int len;
202 sysadm 1.14 struct sockaddr_in sin;
203 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
204     char output_buf[LINE_BUFFER_LEN];
205     int input_buf_len = 0;
206     int output_buf_len = 0;
207     int input_buf_offset = 0;
208     int output_buf_offset = 0;
209 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
210     char output_conv[LINE_BUFFER_LEN * 2];
211     int input_conv_len = 0;
212     int output_conv_len = 0;
213     int input_conv_offset = 0;
214     int output_conv_offset = 0;
215 sysadm 1.67 iconv_t input_cd = NULL;
216 sysadm 1.60 iconv_t output_cd = NULL;
217 sysadm 1.68 char tocode[32];
218 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
219     int nfds, epollfd;
220     int stdin_read_wait = 0;
221     int stdout_write_wait = 0;
222     int sock_read_wait = 0;
223     int sock_write_wait = 0;
224 sysadm 1.26 struct hostent *p_host = NULL;
225 sysadm 1.31 int tos;
226 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
227 sysadm 1.14 int remote_port;
228 sysadm 1.63 char local_addr[IP_ADDR_LEN];
229     int local_port;
230     socklen_t sock_len;
231 sysadm 1.56 time_t t_used = time(NULL);
232 sysadm 1.14 struct tm *tm_used;
233 sysadm 1.26 int ch;
234 sysadm 1.14
235 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
236     {
237     log_error("user_online_update(BBS_NET) error\n");
238     }
239    
240 sysadm 1.14 clearscr();
241    
242     moveto(0, 0);
243 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
244 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
245     iflush();
246    
247 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
248 sysadm 1.14
249 sysadm 1.26 if (p_host == NULL)
250 sysadm 1.1 {
251 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
252 sysadm 1.14 press_any_key();
253     return -1;
254 sysadm 1.1 }
255 sysadm 1.14
256     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
257    
258     if (sock < 0)
259 sysadm 1.1 {
260 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
261 sysadm 1.14 press_any_key();
262     return -1;
263 sysadm 1.1 }
264    
265 sysadm 1.14 sin.sin_family = AF_INET;
266 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
267 sysadm 1.14 sin.sin_port = 0;
268    
269     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
270     {
271 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
272     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
273 sysadm 1.14 return -2;
274     }
275 sysadm 1.1
276 sysadm 1.49 memset(&sin, 0, sizeof(sin));
277 sysadm 1.14 sin.sin_family = AF_INET;
278 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
279 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
280    
281 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
282     remote_addr[sizeof(remote_addr) - 1] = '\0';
283 sysadm 1.14 remote_port = ntohs(sin.sin_port);
284    
285 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
286 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
287 sysadm 1.29
288 sysadm 1.39 // Set socket as non-blocking
289     flags_sock = fcntl(sock, F_GETFL, 0);
290     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
291    
292     // Set STDIN/STDOUT as non-blocking
293     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
294     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
295     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
296     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
297    
298 sysadm 1.38 epollfd = epoll_create1(0);
299     if (epollfd < 0)
300     {
301     log_error("epoll_create1() error (%d)\n", errno);
302     return -1;
303     }
304    
305 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
306 sysadm 1.38 ev.data.fd = sock;
307     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
308     {
309     log_error("epoll_ctl(socket) error (%d)\n", errno);
310 sysadm 1.39 goto cleanup;
311 sysadm 1.38 }
312    
313 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
314 sysadm 1.38 ev.data.fd = STDIN_FILENO;
315     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
316     {
317     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
318 sysadm 1.39 goto cleanup;
319 sysadm 1.38 }
320    
321     while (!SYS_server_exit)
322 sysadm 1.29 {
323 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
324 sysadm 1.29 {
325 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
326     {
327     // Use select / epoll to check writability of the socket,
328     // then use getsockopt to check the status of the socket.
329     // See man connect(2)
330     break;
331     }
332     else if (errno == EINTR)
333     {
334     continue;
335     }
336     else
337     {
338     log_error("connect(socket) error (%d)\n", errno);
339 sysadm 1.39
340 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
341 sysadm 1.38 press_any_key();
342 sysadm 1.39
343     goto cleanup;
344 sysadm 1.38 }
345 sysadm 1.29 }
346     }
347    
348 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
349 sysadm 1.1 {
350 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
351 sysadm 1.29
352 sysadm 1.38 if (nfds < 0)
353 sysadm 1.20 {
354 sysadm 1.29 if (errno != EINTR)
355     {
356 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
357 sysadm 1.39 break;
358 sysadm 1.29 }
359 sysadm 1.20 }
360 sysadm 1.38 else if (nfds == 0) // timeout
361     {
362     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
363     }
364     else // ret > 0
365 sysadm 1.14 {
366 sysadm 1.38 for (int i = 0; i < nfds; i++)
367 sysadm 1.29 {
368 sysadm 1.38 if (events[i].data.fd == sock)
369     {
370     len = sizeof(error);
371     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
372     {
373     log_error("getsockopt() error (%d) !\n", error);
374 sysadm 1.39 goto cleanup;
375 sysadm 1.38 }
376     if (error == 0)
377     {
378     sock_connected = 1;
379     }
380     }
381     else if (events[i].data.fd == STDIN_FILENO)
382     {
383     ch = igetch(0);
384 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
385 sysadm 1.38 {
386 sysadm 1.39 goto cleanup;
387 sysadm 1.38 }
388     }
389 sysadm 1.29 }
390 sysadm 1.14 }
391 sysadm 1.12 }
392 sysadm 1.38 if (SYS_server_exit)
393     {
394 sysadm 1.39 goto cleanup;
395 sysadm 1.38 }
396     if (!sock_connected)
397 sysadm 1.12 {
398 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
399 sysadm 1.14 press_any_key();
400 sysadm 1.39
401     goto cleanup;
402 sysadm 1.12 }
403 sysadm 1.29
404 sysadm 1.31 tos = IPTOS_LOWDELAY;
405     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
406     {
407     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
408     }
409 sysadm 1.14
410 sysadm 1.63 sock_len = sizeof(sin);
411     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
412     {
413     log_error("getsockname() error: %d", errno);
414     goto cleanup;
415     }
416    
417     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
418     local_addr[sizeof(local_addr) - 1] = '\0';
419     local_port = ntohs(sin.sin_port);
420    
421 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
422 sysadm 1.33 iflush();
423 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
424     remote_addr, remote_port, local_addr, local_port, BBS_username);
425 sysadm 1.14
426 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
427     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
428 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
429 sysadm 1.60 if (input_cd == (iconv_t)(-1))
430     {
431 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
432 sysadm 1.60 goto cleanup;
433     }
434 sysadm 1.68
435 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
436     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
437 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
438 sysadm 1.67 if (output_cd == (iconv_t)(-1))
439 sysadm 1.60 {
440 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
441 sysadm 1.60 iconv_close(input_cd);
442     goto cleanup;
443     }
444    
445 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
446     ev.data.fd = sock;
447     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
448     {
449     log_error("epoll_ctl(socket) error (%d)\n", errno);
450 sysadm 1.39 goto cleanup;
451 sysadm 1.38 }
452    
453 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
454 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
455     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
456     {
457     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
458 sysadm 1.39 goto cleanup;
459 sysadm 1.38 }
460    
461 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
462 sysadm 1.14 loop = 1;
463    
464 sysadm 1.26 while (loop && !SYS_server_exit)
465 sysadm 1.12 {
466 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
467     {
468     log_error("SSH channel is closed\n");
469     loop = 0;
470     break;
471     }
472    
473 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
474 sysadm 1.33
475 sysadm 1.38 if (nfds < 0)
476 sysadm 1.14 {
477 sysadm 1.38 if (errno != EINTR)
478 sysadm 1.14 {
479 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
480     break;
481 sysadm 1.14 }
482 sysadm 1.38 continue;
483 sysadm 1.14 }
484 sysadm 1.38 else if (nfds == 0) // timeout
485 sysadm 1.1 {
486 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
487 sysadm 1.28 {
488 sysadm 1.38 break;
489 sysadm 1.28 }
490 sysadm 1.1 }
491 sysadm 1.38
492     for (int i = 0; i < nfds; i++)
493 sysadm 1.1 {
494 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
495 sysadm 1.14 {
496 sysadm 1.38 stdin_read_wait = 1;
497 sysadm 1.59 }
498    
499     if (events[i].data.fd == sock)
500     {
501     if (events[i].events & EPOLLIN)
502     {
503     sock_read_wait = 1;
504     }
505     if (events[i].events & EPOLLOUT)
506     {
507     sock_write_wait = 1;
508     }
509     }
510    
511     if (events[i].data.fd == STDOUT_FILENO)
512     {
513     stdout_write_wait = 1;
514     }
515     }
516    
517     if (stdin_read_wait)
518     {
519     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
520     {
521     if (SSH_v2)
522 sysadm 1.33 {
523 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
524     if (ret == SSH_ERROR)
525 sysadm 1.47 {
526 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
527     loop = 0;
528     break;
529 sysadm 1.47 }
530 sysadm 1.59 else if (ret == SSH_EOF)
531 sysadm 1.47 {
532 sysadm 1.59 stdin_read_wait = 0;
533     loop = 0;
534     break;
535 sysadm 1.47 }
536 sysadm 1.59 else if (ret == 0)
537 sysadm 1.33 {
538 sysadm 1.72 // Send NO-OP to remote server
539     input_buf[input_buf_len] = '\0';
540     input_buf_len++;
541 sysadm 1.73 BBS_last_access_tm = time(NULL);
542 sysadm 1.72
543 sysadm 1.59 stdin_read_wait = 0;
544     break; // Check whether channel is still open
545 sysadm 1.38 }
546 sysadm 1.59 }
547     else
548     {
549     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
550     }
551     if (ret < 0)
552     {
553     if (errno == EAGAIN || errno == EWOULDBLOCK)
554 sysadm 1.38 {
555     stdin_read_wait = 0;
556     break;
557     }
558 sysadm 1.59 else if (errno == EINTR)
559     {
560     continue;
561     }
562 sysadm 1.38 else
563     {
564 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
565     loop = 0;
566     break;
567     }
568     }
569     else if (ret == 0) // broken pipe
570     {
571     #ifdef _DEBUG
572     log_error("read(STDIN) EOF\n");
573     #endif
574     stdin_read_wait = 0;
575     loop = 0;
576     break;
577     }
578     else
579     {
580     input_buf_len += ret;
581     BBS_last_access_tm = time(NULL);
582 sysadm 1.58
583 sysadm 1.59 // Refresh current action while user input
584     if (user_online_update("BBS_NET") < 0)
585     {
586     log_error("user_online_update(BBS_NET) error\n");
587     }
588 sysadm 1.58
589 sysadm 1.59 continue;
590 sysadm 1.33 }
591 sysadm 1.36 }
592 sysadm 1.59 }
593 sysadm 1.29
594 sysadm 1.59 if (sock_write_wait)
595     {
596 sysadm 1.60 if (input_buf_offset < input_buf_len)
597 sysadm 1.36 {
598 sysadm 1.72 // For debug
599     #ifdef _DEBUG
600     for (int j = input_buf_offset; j < input_buf_len; j++)
601     {
602     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
603     }
604     #endif
605    
606 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
607 sysadm 1.60 if (ret < 0)
608     {
609 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
610 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
611 sysadm 1.60 }
612 sysadm 1.72
613     // For debug
614     #ifdef _DEBUG
615     for (int j = input_conv_offset; j < input_conv_len; j++)
616     {
617     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
618     }
619     #endif
620 sysadm 1.60 }
621    
622     while (input_conv_offset < input_conv_len && !SYS_server_exit)
623     {
624     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
625 sysadm 1.59 if (ret < 0)
626 sysadm 1.36 {
627 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
628 sysadm 1.36 {
629 sysadm 1.59 sock_write_wait = 0;
630     break;
631 sysadm 1.38 }
632 sysadm 1.59 else if (errno == EINTR)
633 sysadm 1.38 {
634 sysadm 1.59 continue;
635     }
636     else
637     {
638     log_error("write(socket) error (%d)\n", errno);
639 sysadm 1.36 loop = 0;
640 sysadm 1.38 break;
641     }
642 sysadm 1.59 }
643     else if (ret == 0) // broken pipe
644     {
645     #ifdef _DEBUG
646     log_error("write(socket) EOF\n");
647     #endif
648     sock_write_wait = 0;
649     loop = 0;
650     break;
651     }
652     else
653     {
654 sysadm 1.60 input_conv_offset += ret;
655     if (input_conv_offset >= input_conv_len) // Output buffer complete
656 sysadm 1.38 {
657 sysadm 1.60 input_conv_offset = 0;
658     input_conv_len = 0;
659 sysadm 1.59 break;
660 sysadm 1.36 }
661 sysadm 1.59 continue;
662 sysadm 1.36 }
663 sysadm 1.14 }
664 sysadm 1.59 }
665 sysadm 1.36
666 sysadm 1.59 if (sock_read_wait)
667     {
668     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
669 sysadm 1.14 {
670 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
671     if (ret < 0)
672 sysadm 1.14 {
673 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
674 sysadm 1.38 {
675 sysadm 1.59 sock_read_wait = 0;
676     break;
677 sysadm 1.38 }
678 sysadm 1.59 else if (errno == EINTR)
679 sysadm 1.33 {
680 sysadm 1.59 continue;
681 sysadm 1.38 }
682     else
683     {
684 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
685     loop = 0;
686     break;
687 sysadm 1.33 }
688     }
689 sysadm 1.59 else if (ret == 0) // broken pipe
690     {
691     #ifdef _DEBUG
692     log_error("read(socket) EOF\n");
693     #endif
694     sock_read_wait = 0;
695     loop = 0;
696     break;
697     }
698     else
699     {
700     output_buf_len += ret;
701     continue;
702     }
703 sysadm 1.36 }
704 sysadm 1.59 }
705 sysadm 1.36
706 sysadm 1.59 if (stdout_write_wait)
707     {
708 sysadm 1.60 if (output_buf_offset < output_buf_len)
709     {
710 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
711 sysadm 1.60 if (ret < 0)
712     {
713 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
714 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
715 sysadm 1.60 }
716     }
717    
718     while (output_conv_offset < output_conv_len && !SYS_server_exit)
719 sysadm 1.36 {
720 sysadm 1.59 if (SSH_v2)
721 sysadm 1.36 {
722 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
723 sysadm 1.59 if (ret == SSH_ERROR)
724 sysadm 1.47 {
725 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
726     loop = 0;
727     break;
728 sysadm 1.47 }
729 sysadm 1.59 }
730     else
731     {
732 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
733 sysadm 1.59 }
734     if (ret < 0)
735     {
736     if (errno == EAGAIN || errno == EWOULDBLOCK)
737 sysadm 1.47 {
738 sysadm 1.59 stdout_write_wait = 0;
739     break;
740 sysadm 1.47 }
741 sysadm 1.59 else if (errno == EINTR)
742 sysadm 1.38 {
743 sysadm 1.59 continue;
744 sysadm 1.38 }
745 sysadm 1.59 else
746 sysadm 1.33 {
747 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
748 sysadm 1.36 loop = 0;
749 sysadm 1.38 break;
750     }
751 sysadm 1.59 }
752     else if (ret == 0) // broken pipe
753     {
754     #ifdef _DEBUG
755     log_error("write(STDOUT) EOF\n");
756     #endif
757     stdout_write_wait = 0;
758     loop = 0;
759     break;
760     }
761     else
762     {
763 sysadm 1.60 output_conv_offset += ret;
764     if (output_conv_offset >= output_conv_len) // Output buffer complete
765 sysadm 1.38 {
766 sysadm 1.60 output_conv_offset = 0;
767     output_conv_len = 0;
768 sysadm 1.59 break;
769 sysadm 1.36 }
770 sysadm 1.59 continue;
771 sysadm 1.36 }
772 sysadm 1.14 }
773 sysadm 1.1 }
774     }
775    
776 sysadm 1.60 iconv_close(input_cd);
777     iconv_close(output_cd);
778    
779 sysadm 1.39 cleanup:
780     if (close(epollfd) < 0)
781     {
782     log_error("close(epoll) error (%d)\n");
783     }
784    
785 sysadm 1.36 // Restore STDIN/STDOUT flags
786     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
787     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
788    
789     // Restore socket flags
790     fcntl(sock, F_SETFL, flags_sock);
791    
792 sysadm 1.14 if (close(sock) == -1)
793     {
794     log_error("Close socket failed\n");
795     }
796 sysadm 1.1
797 sysadm 1.50 t_used = time(NULL) - t_used;
798 sysadm 1.14 tm_used = gmtime(&t_used);
799 sysadm 1.8
800 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
801 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
802     tm_used->tm_sec);
803 sysadm 1.8
804 sysadm 1.72 BBS_last_access_tm = time(NULL);
805    
806 sysadm 1.14 return 0;
807 sysadm 1.1 }
808    
809 sysadm 1.74 static int bbsnet_refresh()
810 sysadm 1.1 {
811 sysadm 1.14 clearscr();
812     moveto(1, 0);
813 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
814 sysadm 1.20 for (int i = 2; i < 19; i++)
815 sysadm 1.14 {
816     moveto(i, 0);
817 sysadm 1.23 prints("|");
818 sysadm 1.14 moveto(i, 79);
819 sysadm 1.23 prints("|");
820 sysadm 1.14 }
821     moveto(19, 0);
822 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
823 sysadm 1.14 moveto(22, 0);
824 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
825 sysadm 1.14 moveto(23, 0);
826 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
827 sysadm 1.13
828 sysadm 1.14 iflush();
829 sysadm 1.1
830 sysadm 1.14 return 0;
831 sysadm 1.1 }
832    
833 sysadm 1.74 static int bbsnet_selchange()
834 sysadm 1.1 {
835 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
836    
837 sysadm 1.14 moveto(20, 0);
838     clrtoeol();
839 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
840 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
841 sysadm 1.14 moveto(20, 79);
842 sysadm 1.23 prints("|");
843 sysadm 1.14 moveto(21, 0);
844     clrtoeol();
845 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
846 sysadm 1.43 if (bbsnet_conf[i].port != 23)
847 sysadm 1.20 {
848 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
849 sysadm 1.20 }
850 sysadm 1.14 prints("\x1b[m");
851     moveto(21, 79);
852 sysadm 1.23 prints("|");
853 sysadm 1.14 iflush();
854 sysadm 1.1
855 sysadm 1.14 return 0;
856 sysadm 1.1 }
857    
858 sysadm 1.74 extern int bbs_net()
859 sysadm 1.1 {
860 sysadm 1.43 int ch, i;
861 sysadm 1.1
862 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
863 sysadm 1.1
864 sysadm 1.14 clearscr();
865     bbsnet_refresh();
866 sysadm 1.41 display_menu(&bbsnet_menu);
867 sysadm 1.43 bbsnet_selchange();
868 sysadm 1.14
869 sysadm 1.26 while (!SYS_server_exit)
870 sysadm 1.1 {
871 sysadm 1.39 ch = igetch(100);
872 sysadm 1.52
873 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
874     {
875     BBS_last_access_tm = time(NULL);
876     }
877 sysadm 1.64
878 sysadm 1.14 switch (ch)
879     {
880 sysadm 1.47 case KEY_NULL: // broken pipe
881 sysadm 1.64 log_error("KEY_NULL\n");
882 sysadm 1.40 goto cleanup;
883 sysadm 1.14 case KEY_TIMEOUT:
884 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
885 sysadm 1.14 {
886 sysadm 1.64 log_error("User input timeout\n");
887 sysadm 1.40 goto cleanup;
888 sysadm 1.14 }
889 sysadm 1.29 continue;
890 sysadm 1.64 case KEY_ESC:
891     case Ctrl('C'): // user cancel
892     goto cleanup;
893 sysadm 1.14 case CR:
894 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
895 sysadm 1.14 bbsnet_refresh();
896 sysadm 1.41 display_menu(&bbsnet_menu);
897 sysadm 1.43 bbsnet_selchange();
898 sysadm 1.14 break;
899     case KEY_UP:
900     for (i = 0; i < STATION_PER_LINE; i++)
901 sysadm 1.20 {
902 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
903 sysadm 1.20 }
904 sysadm 1.43 bbsnet_selchange();
905 sysadm 1.14 break;
906     case KEY_DOWN:
907     for (i = 0; i < STATION_PER_LINE; i++)
908 sysadm 1.20 {
909 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
910 sysadm 1.20 }
911 sysadm 1.43 bbsnet_selchange();
912 sysadm 1.14 break;
913     case KEY_LEFT:
914     menu_control(&bbsnet_menu, KEY_UP);
915 sysadm 1.43 bbsnet_selchange();
916 sysadm 1.14 break;
917     case KEY_RIGHT:
918     menu_control(&bbsnet_menu, KEY_DOWN);
919 sysadm 1.43 bbsnet_selchange();
920     break;
921 sysadm 1.44 case KEY_HOME:
922 sysadm 1.43 case KEY_PGUP:
923     menu_control(&bbsnet_menu, KEY_PGUP);
924     bbsnet_selchange();
925 sysadm 1.14 break;
926 sysadm 1.44 case KEY_END:
927     case KEY_PGDN:
928     menu_control(&bbsnet_menu, KEY_PGDN);
929     bbsnet_selchange();
930     break;
931 sysadm 1.14 default:
932     menu_control(&bbsnet_menu, ch);
933 sysadm 1.43 bbsnet_selchange();
934 sysadm 1.14 break;
935     }
936 sysadm 1.1 }
937    
938 sysadm 1.40 cleanup:
939     unload_bbsnet_conf();
940    
941 sysadm 1.14 return 0;
942 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1