/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.82 - (hide annotations)
Mon Nov 17 06:41:18 2025 UTC (3 months, 4 weeks ago) by sysadm
Branch: MAIN
Changes since 1.81: +82 -8 lines
Content type: text/x-csrc
Add --with-epoll to configure to switch between epoll and poll

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14     #include "common.h"
15 sysadm 1.55 #include "io.h"
16 sysadm 1.15 #include "log.h"
17 sysadm 1.55 #include "login.h"
18     #include "menu.h"
19 sysadm 1.15 #include "screen.h"
20 sysadm 1.55 #include <errno.h>
21     #include <fcntl.h>
22     #include <netdb.h>
23     #include <stdarg.h>
24 sysadm 1.1 #include <stdio.h>
25 sysadm 1.55 #include <stdlib.h>
26 sysadm 1.29 #include <string.h>
27     #include <time.h>
28     #include <unistd.h>
29 sysadm 1.55 #include <arpa/inet.h>
30     #include <libssh/libssh.h>
31     #include <libssh/server.h>
32     #include <libssh/callbacks.h>
33     #include <netinet/in.h>
34     #include <netinet/ip.h>
35 sysadm 1.29 #include <sys/select.h>
36 sysadm 1.1 #include <sys/ioctl.h>
37     #include <sys/socket.h>
38 sysadm 1.82
39     #ifdef HAVE_SYS_EPOLL_H
40 sysadm 1.38 #include <sys/epoll.h>
41 sysadm 1.82 #else
42     #include <poll.h>
43     #endif
44 sysadm 1.1
45 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
46 sysadm 1.26
47 sysadm 1.80 enum _bbs_net_constant_t
48     {
49     MAX_PROCESS_BAR_LEN = 30,
50     MAXSTATION = 26 * 2,
51     STATION_PER_LINE = 4,
52     };
53 sysadm 1.1
54     struct _bbsnet_conf
55     {
56 sysadm 1.14 char host1[20];
57     char host2[40];
58     char ip[40];
59 sysadm 1.24 in_port_t port;
60 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
61 sysadm 1.1 } bbsnet_conf[MAXSTATION];
62    
63 sysadm 1.74 static MENU_SET bbsnet_menu;
64 sysadm 1.1
65 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
66 sysadm 1.1 {
67 sysadm 1.14 FILE *fp;
68     MENU *p_menu;
69 sysadm 1.41 MENU_ITEM *p_menu_item;
70     MENU_ITEM_ID menu_item_id;
71 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
72 sysadm 1.14
73     fp = fopen(file_config, "r");
74     if (fp == NULL)
75 sysadm 1.20 {
76 sysadm 1.14 return -1;
77 sysadm 1.20 }
78 sysadm 1.14
79 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
80     if (bbsnet_menu.p_menu_pool == NULL)
81     {
82     log_error("calloc(p_menu_pool) error\n");
83     return -3;
84     }
85     bbsnet_menu.menu_count = 1;
86    
87     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
88     if (bbsnet_menu.p_menu_item_pool == NULL)
89     {
90     log_error("calloc(p_menu_item_pool) error\n");
91     return -3;
92     }
93     bbsnet_menu.menu_item_count = MAXSTATION;
94    
95     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
96 sysadm 1.40
97 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
98     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
99 sysadm 1.14 p_menu->title.show = 0;
100 sysadm 1.41 p_menu->screen_show = 0;
101 sysadm 1.1
102 sysadm 1.41 menu_item_id = 0;
103     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
104 sysadm 1.14 {
105 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
106     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
107     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
108     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
109 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
110 sysadm 1.14
111 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
112 sysadm 1.18 {
113 sysadm 1.14 continue;
114 sysadm 1.18 }
115    
116 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
117     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
118     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
119     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
120     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
121     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
122     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
123 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
124     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
125 sysadm 1.14
126 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
127     if (p_menu_item == NULL)
128     {
129     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
130     return -1;
131     }
132 sysadm 1.14
133 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
134     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
135     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
136     p_menu_item->submenu = 0;
137     p_menu_item->priv = 0;
138     p_menu_item->level = 0;
139     p_menu_item->name[0] =
140     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
141     p_menu_item->name[1] = '\0';
142     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
143     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
144    
145     p_menu->items[p_menu->item_count] = menu_item_id;
146     p_menu->item_count++;
147     menu_item_id++;
148     }
149    
150     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
151     bbsnet_menu.menu_id_path[0] = 0;
152     bbsnet_menu.menu_item_pos[0] = 0;
153     bbsnet_menu.choose_step = 0;
154 sysadm 1.14
155 sysadm 1.41 fclose(fp);
156 sysadm 1.14
157     return 0;
158 sysadm 1.1 }
159    
160 sysadm 1.74 static void unload_bbsnet_conf(void)
161 sysadm 1.40 {
162 sysadm 1.41 bbsnet_menu.menu_count = 0;
163     bbsnet_menu.menu_item_count = 0;
164    
165     free(bbsnet_menu.p_menu_pool);
166     bbsnet_menu.p_menu_pool = NULL;
167     free(bbsnet_menu.p_menu_item_pool);
168     bbsnet_menu.p_menu_item_pool = NULL;
169 sysadm 1.40 }
170    
171 sysadm 1.74 static void process_bar(int n, int len)
172 sysadm 1.1 {
173 sysadm 1.27 char buf[LINE_BUFFER_LEN];
174     char buf2[LINE_BUFFER_LEN];
175    
176     if (len > LINE_BUFFER_LEN)
177     {
178     len = LINE_BUFFER_LEN - 1;
179     }
180     if (n < 0)
181     {
182     n = 0;
183     }
184     else if (n > len)
185     {
186     n = len;
187     }
188 sysadm 1.14
189     moveto(4, 0);
190 sysadm 1.23 prints(" ------------------------------ \r\n");
191 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
192 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
193 sysadm 1.27 buf2[n] = '\0';
194     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
195 sysadm 1.23 prints(" ------------------------------ \r\n");
196 sysadm 1.14 iflush();
197 sysadm 1.1 }
198    
199 sysadm 1.74 static int bbsnet_connect(int n)
200 sysadm 1.1 {
201 sysadm 1.36 int sock, ret, loop, error;
202 sysadm 1.38 int sock_connected = 0;
203 sysadm 1.36 int flags_sock;
204     int flags_stdin;
205     int flags_stdout;
206     int len;
207 sysadm 1.14 struct sockaddr_in sin;
208 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
209     char output_buf[LINE_BUFFER_LEN];
210     int input_buf_len = 0;
211     int output_buf_len = 0;
212     int input_buf_offset = 0;
213     int output_buf_offset = 0;
214 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
215     char output_conv[LINE_BUFFER_LEN * 2];
216     int input_conv_len = 0;
217     int output_conv_len = 0;
218     int input_conv_offset = 0;
219     int output_conv_offset = 0;
220 sysadm 1.67 iconv_t input_cd = NULL;
221 sysadm 1.60 iconv_t output_cd = NULL;
222 sysadm 1.68 char tocode[32];
223 sysadm 1.82
224     #ifdef HAVE_SYS_EPOLL_H
225 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
226 sysadm 1.82 int epollfd;
227     #else
228     struct pollfd pfds[3];
229     #endif
230    
231     int nfds;
232 sysadm 1.38 int stdin_read_wait = 0;
233     int stdout_write_wait = 0;
234     int sock_read_wait = 0;
235     int sock_write_wait = 0;
236 sysadm 1.26 struct hostent *p_host = NULL;
237 sysadm 1.31 int tos;
238 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
239 sysadm 1.14 int remote_port;
240 sysadm 1.63 char local_addr[IP_ADDR_LEN];
241     int local_port;
242     socklen_t sock_len;
243 sysadm 1.56 time_t t_used = time(NULL);
244 sysadm 1.14 struct tm *tm_used;
245 sysadm 1.26 int ch;
246 sysadm 1.14
247 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
248     {
249     log_error("user_online_update(BBS_NET) error\n");
250     }
251    
252 sysadm 1.14 clearscr();
253    
254     moveto(0, 0);
255 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
256 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
257     iflush();
258    
259 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
260 sysadm 1.14
261 sysadm 1.26 if (p_host == NULL)
262 sysadm 1.1 {
263 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
264 sysadm 1.14 press_any_key();
265     return -1;
266 sysadm 1.1 }
267 sysadm 1.14
268     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
269    
270     if (sock < 0)
271 sysadm 1.1 {
272 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
273 sysadm 1.14 press_any_key();
274     return -1;
275 sysadm 1.1 }
276    
277 sysadm 1.14 sin.sin_family = AF_INET;
278 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
279 sysadm 1.14 sin.sin_port = 0;
280    
281     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
282     {
283 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
284     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
285 sysadm 1.14 return -2;
286     }
287 sysadm 1.1
288 sysadm 1.49 memset(&sin, 0, sizeof(sin));
289 sysadm 1.14 sin.sin_family = AF_INET;
290 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
291 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
292    
293 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
294     remote_addr[sizeof(remote_addr) - 1] = '\0';
295 sysadm 1.14 remote_port = ntohs(sin.sin_port);
296    
297 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
298 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
299 sysadm 1.29
300 sysadm 1.39 // Set socket as non-blocking
301     flags_sock = fcntl(sock, F_GETFL, 0);
302     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
303    
304     // Set STDIN/STDOUT as non-blocking
305     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
306     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
307     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
308     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
309    
310 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
311 sysadm 1.38 epollfd = epoll_create1(0);
312     if (epollfd < 0)
313     {
314     log_error("epoll_create1() error (%d)\n", errno);
315     return -1;
316     }
317    
318 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
319 sysadm 1.38 ev.data.fd = sock;
320     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
321     {
322     log_error("epoll_ctl(socket) error (%d)\n", errno);
323 sysadm 1.39 goto cleanup;
324 sysadm 1.38 }
325    
326 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
327 sysadm 1.38 ev.data.fd = STDIN_FILENO;
328     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
329     {
330     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
331 sysadm 1.39 goto cleanup;
332 sysadm 1.38 }
333 sysadm 1.82 #endif
334 sysadm 1.38
335     while (!SYS_server_exit)
336 sysadm 1.29 {
337 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
338 sysadm 1.29 {
339 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
340     {
341     // Use select / epoll to check writability of the socket,
342     // then use getsockopt to check the status of the socket.
343     // See man connect(2)
344     break;
345     }
346     else if (errno == EINTR)
347     {
348     continue;
349     }
350     else
351     {
352     log_error("connect(socket) error (%d)\n", errno);
353 sysadm 1.39
354 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
355 sysadm 1.38 press_any_key();
356 sysadm 1.39
357     goto cleanup;
358 sysadm 1.38 }
359 sysadm 1.29 }
360     }
361    
362 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
363 sysadm 1.1 {
364 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
365 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
366 sysadm 1.82 ret = nfds;
367     #else
368     pfds[0].fd = sock;
369     pfds[0].events = POLLOUT;
370     pfds[1].fd = STDIN_FILENO;
371     pfds[1].events = POLLIN;
372     nfds = 2;
373     ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
374     #endif
375 sysadm 1.29
376 sysadm 1.82 if (ret < 0)
377 sysadm 1.20 {
378 sysadm 1.29 if (errno != EINTR)
379     {
380 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
381 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
382 sysadm 1.82 #else
383     log_error("poll() error (%d)\n", errno);
384     #endif
385 sysadm 1.39 break;
386 sysadm 1.29 }
387 sysadm 1.20 }
388 sysadm 1.82 else if (ret == 0) // timeout
389 sysadm 1.38 {
390     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
391     }
392     else // ret > 0
393 sysadm 1.14 {
394 sysadm 1.38 for (int i = 0; i < nfds; i++)
395 sysadm 1.29 {
396 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
397 sysadm 1.38 if (events[i].data.fd == sock)
398 sysadm 1.82 #else
399     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
400     #endif
401 sysadm 1.38 {
402     len = sizeof(error);
403     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
404     {
405     log_error("getsockopt() error (%d) !\n", error);
406 sysadm 1.39 goto cleanup;
407 sysadm 1.38 }
408     if (error == 0)
409     {
410     sock_connected = 1;
411     }
412     }
413 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
414 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
415 sysadm 1.82 #else
416     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
417     #endif
418 sysadm 1.38 {
419     ch = igetch(0);
420 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
421 sysadm 1.38 {
422 sysadm 1.39 goto cleanup;
423 sysadm 1.38 }
424     }
425 sysadm 1.29 }
426 sysadm 1.14 }
427 sysadm 1.12 }
428 sysadm 1.38 if (SYS_server_exit)
429     {
430 sysadm 1.39 goto cleanup;
431 sysadm 1.38 }
432     if (!sock_connected)
433 sysadm 1.12 {
434 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
435 sysadm 1.14 press_any_key();
436 sysadm 1.39
437     goto cleanup;
438 sysadm 1.12 }
439 sysadm 1.29
440 sysadm 1.31 tos = IPTOS_LOWDELAY;
441     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
442     {
443     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
444     }
445 sysadm 1.14
446 sysadm 1.63 sock_len = sizeof(sin);
447     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
448     {
449     log_error("getsockname() error: %d", errno);
450     goto cleanup;
451     }
452    
453     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
454     local_addr[sizeof(local_addr) - 1] = '\0';
455     local_port = ntohs(sin.sin_port);
456    
457 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
458 sysadm 1.33 iflush();
459 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
460     remote_addr, remote_port, local_addr, local_port, BBS_username);
461 sysadm 1.14
462 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
463     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
464 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
465 sysadm 1.60 if (input_cd == (iconv_t)(-1))
466     {
467 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
468 sysadm 1.60 goto cleanup;
469     }
470 sysadm 1.68
471 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
472     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
473 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
474 sysadm 1.67 if (output_cd == (iconv_t)(-1))
475 sysadm 1.60 {
476 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
477 sysadm 1.60 iconv_close(input_cd);
478     goto cleanup;
479     }
480    
481 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
482 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
483     ev.data.fd = sock;
484     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
485     {
486     log_error("epoll_ctl(socket) error (%d)\n", errno);
487 sysadm 1.39 goto cleanup;
488 sysadm 1.38 }
489    
490 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
491 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
492     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
493     {
494     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
495 sysadm 1.39 goto cleanup;
496 sysadm 1.38 }
497 sysadm 1.82 #endif
498 sysadm 1.38
499 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
500 sysadm 1.14 loop = 1;
501    
502 sysadm 1.26 while (loop && !SYS_server_exit)
503 sysadm 1.12 {
504 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
505     {
506     log_error("SSH channel is closed\n");
507     loop = 0;
508     break;
509     }
510    
511 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
512 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
513 sysadm 1.82 ret = nfds;
514     #else
515     pfds[0].fd = STDIN_FILENO;
516     pfds[0].events = POLLIN;
517     pfds[1].fd = sock;
518     pfds[1].events = POLLIN | POLLOUT;
519     pfds[2].fd = STDOUT_FILENO;
520     pfds[2].events = POLLOUT;
521     nfds = 3;
522     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
523     #endif
524 sysadm 1.33
525 sysadm 1.82 if (ret < 0)
526 sysadm 1.14 {
527 sysadm 1.38 if (errno != EINTR)
528 sysadm 1.14 {
529 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
530 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
531 sysadm 1.82 #else
532     log_error("poll() error (%d)\n", errno);
533     #endif
534 sysadm 1.38 break;
535 sysadm 1.14 }
536 sysadm 1.38 continue;
537 sysadm 1.14 }
538 sysadm 1.82 else if (ret == 0) // timeout
539 sysadm 1.1 {
540 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
541 sysadm 1.28 {
542 sysadm 1.38 break;
543 sysadm 1.28 }
544 sysadm 1.1 }
545 sysadm 1.38
546     for (int i = 0; i < nfds; i++)
547 sysadm 1.1 {
548 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
549 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
550 sysadm 1.82 #else
551     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
552     #endif
553 sysadm 1.14 {
554 sysadm 1.38 stdin_read_wait = 1;
555 sysadm 1.59 }
556    
557 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
558 sysadm 1.59 if (events[i].data.fd == sock)
559 sysadm 1.82 #else
560     if (pfds[i].fd == sock)
561     #endif
562 sysadm 1.59 {
563 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
564 sysadm 1.59 if (events[i].events & EPOLLIN)
565 sysadm 1.82 #else
566     if (pfds[i].revents & POLLIN)
567     #endif
568 sysadm 1.59 {
569     sock_read_wait = 1;
570     }
571 sysadm 1.82
572     #ifdef HAVE_SYS_EPOLL_H
573 sysadm 1.59 if (events[i].events & EPOLLOUT)
574 sysadm 1.82 #else
575     if (pfds[i].revents & POLLOUT)
576     #endif
577 sysadm 1.59 {
578     sock_write_wait = 1;
579     }
580     }
581    
582 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
583 sysadm 1.59 if (events[i].data.fd == STDOUT_FILENO)
584 sysadm 1.82 #else
585     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
586     #endif
587 sysadm 1.59 {
588     stdout_write_wait = 1;
589     }
590     }
591    
592     if (stdin_read_wait)
593     {
594     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
595     {
596     if (SSH_v2)
597 sysadm 1.33 {
598 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
599     if (ret == SSH_ERROR)
600 sysadm 1.47 {
601 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
602     loop = 0;
603     break;
604 sysadm 1.47 }
605 sysadm 1.59 else if (ret == SSH_EOF)
606 sysadm 1.47 {
607 sysadm 1.59 stdin_read_wait = 0;
608     loop = 0;
609     break;
610 sysadm 1.47 }
611 sysadm 1.59 else if (ret == 0)
612 sysadm 1.33 {
613 sysadm 1.72 // Send NO-OP to remote server
614     input_buf[input_buf_len] = '\0';
615     input_buf_len++;
616 sysadm 1.73 BBS_last_access_tm = time(NULL);
617 sysadm 1.72
618 sysadm 1.59 stdin_read_wait = 0;
619     break; // Check whether channel is still open
620 sysadm 1.38 }
621 sysadm 1.59 }
622     else
623     {
624     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
625     }
626     if (ret < 0)
627     {
628     if (errno == EAGAIN || errno == EWOULDBLOCK)
629 sysadm 1.38 {
630     stdin_read_wait = 0;
631     break;
632     }
633 sysadm 1.59 else if (errno == EINTR)
634     {
635     continue;
636     }
637 sysadm 1.38 else
638     {
639 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
640     loop = 0;
641     break;
642     }
643     }
644     else if (ret == 0) // broken pipe
645     {
646     #ifdef _DEBUG
647     log_error("read(STDIN) EOF\n");
648     #endif
649     stdin_read_wait = 0;
650     loop = 0;
651     break;
652     }
653     else
654     {
655     input_buf_len += ret;
656     BBS_last_access_tm = time(NULL);
657 sysadm 1.58
658 sysadm 1.59 // Refresh current action while user input
659     if (user_online_update("BBS_NET") < 0)
660     {
661     log_error("user_online_update(BBS_NET) error\n");
662     }
663 sysadm 1.58
664 sysadm 1.59 continue;
665 sysadm 1.33 }
666 sysadm 1.36 }
667 sysadm 1.59 }
668 sysadm 1.29
669 sysadm 1.59 if (sock_write_wait)
670     {
671 sysadm 1.60 if (input_buf_offset < input_buf_len)
672 sysadm 1.36 {
673 sysadm 1.72 // For debug
674     #ifdef _DEBUG
675     for (int j = input_buf_offset; j < input_buf_len; j++)
676     {
677     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
678     }
679     #endif
680    
681 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
682 sysadm 1.60 if (ret < 0)
683     {
684 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
685 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
686 sysadm 1.60 }
687 sysadm 1.72
688     // For debug
689     #ifdef _DEBUG
690     for (int j = input_conv_offset; j < input_conv_len; j++)
691     {
692     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
693     }
694     #endif
695 sysadm 1.60 }
696    
697     while (input_conv_offset < input_conv_len && !SYS_server_exit)
698     {
699     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
700 sysadm 1.59 if (ret < 0)
701 sysadm 1.36 {
702 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
703 sysadm 1.36 {
704 sysadm 1.59 sock_write_wait = 0;
705     break;
706 sysadm 1.38 }
707 sysadm 1.59 else if (errno == EINTR)
708 sysadm 1.38 {
709 sysadm 1.59 continue;
710     }
711     else
712     {
713     log_error("write(socket) error (%d)\n", errno);
714 sysadm 1.36 loop = 0;
715 sysadm 1.38 break;
716     }
717 sysadm 1.59 }
718     else if (ret == 0) // broken pipe
719     {
720     #ifdef _DEBUG
721     log_error("write(socket) EOF\n");
722     #endif
723     sock_write_wait = 0;
724     loop = 0;
725     break;
726     }
727     else
728     {
729 sysadm 1.60 input_conv_offset += ret;
730     if (input_conv_offset >= input_conv_len) // Output buffer complete
731 sysadm 1.38 {
732 sysadm 1.60 input_conv_offset = 0;
733     input_conv_len = 0;
734 sysadm 1.59 break;
735 sysadm 1.36 }
736 sysadm 1.59 continue;
737 sysadm 1.36 }
738 sysadm 1.14 }
739 sysadm 1.59 }
740 sysadm 1.36
741 sysadm 1.59 if (sock_read_wait)
742     {
743     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
744 sysadm 1.14 {
745 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
746     if (ret < 0)
747 sysadm 1.14 {
748 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
749 sysadm 1.38 {
750 sysadm 1.59 sock_read_wait = 0;
751     break;
752 sysadm 1.38 }
753 sysadm 1.59 else if (errno == EINTR)
754 sysadm 1.33 {
755 sysadm 1.59 continue;
756 sysadm 1.38 }
757     else
758     {
759 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
760     loop = 0;
761     break;
762 sysadm 1.33 }
763     }
764 sysadm 1.59 else if (ret == 0) // broken pipe
765     {
766     #ifdef _DEBUG
767     log_error("read(socket) EOF\n");
768     #endif
769     sock_read_wait = 0;
770     loop = 0;
771     break;
772     }
773     else
774     {
775     output_buf_len += ret;
776     continue;
777     }
778 sysadm 1.36 }
779 sysadm 1.59 }
780 sysadm 1.36
781 sysadm 1.59 if (stdout_write_wait)
782     {
783 sysadm 1.60 if (output_buf_offset < output_buf_len)
784     {
785 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
786 sysadm 1.60 if (ret < 0)
787     {
788 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
789 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
790 sysadm 1.60 }
791     }
792    
793     while (output_conv_offset < output_conv_len && !SYS_server_exit)
794 sysadm 1.36 {
795 sysadm 1.59 if (SSH_v2)
796 sysadm 1.36 {
797 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
798 sysadm 1.59 if (ret == SSH_ERROR)
799 sysadm 1.47 {
800 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
801     loop = 0;
802     break;
803 sysadm 1.47 }
804 sysadm 1.59 }
805     else
806     {
807 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
808 sysadm 1.59 }
809     if (ret < 0)
810     {
811     if (errno == EAGAIN || errno == EWOULDBLOCK)
812 sysadm 1.47 {
813 sysadm 1.59 stdout_write_wait = 0;
814     break;
815 sysadm 1.47 }
816 sysadm 1.59 else if (errno == EINTR)
817 sysadm 1.38 {
818 sysadm 1.59 continue;
819 sysadm 1.38 }
820 sysadm 1.59 else
821 sysadm 1.33 {
822 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
823 sysadm 1.36 loop = 0;
824 sysadm 1.38 break;
825     }
826 sysadm 1.59 }
827     else if (ret == 0) // broken pipe
828     {
829     #ifdef _DEBUG
830     log_error("write(STDOUT) EOF\n");
831     #endif
832     stdout_write_wait = 0;
833     loop = 0;
834     break;
835     }
836     else
837     {
838 sysadm 1.60 output_conv_offset += ret;
839     if (output_conv_offset >= output_conv_len) // Output buffer complete
840 sysadm 1.38 {
841 sysadm 1.60 output_conv_offset = 0;
842     output_conv_len = 0;
843 sysadm 1.59 break;
844 sysadm 1.36 }
845 sysadm 1.59 continue;
846 sysadm 1.36 }
847 sysadm 1.14 }
848 sysadm 1.1 }
849     }
850    
851 sysadm 1.60 iconv_close(input_cd);
852     iconv_close(output_cd);
853    
854 sysadm 1.39 cleanup:
855 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
856 sysadm 1.39 if (close(epollfd) < 0)
857     {
858     log_error("close(epoll) error (%d)\n");
859     }
860 sysadm 1.82 #endif
861 sysadm 1.39
862 sysadm 1.36 // Restore STDIN/STDOUT flags
863     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
864     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
865    
866 sysadm 1.14 if (close(sock) == -1)
867     {
868     log_error("Close socket failed\n");
869     }
870 sysadm 1.1
871 sysadm 1.50 t_used = time(NULL) - t_used;
872 sysadm 1.14 tm_used = gmtime(&t_used);
873 sysadm 1.8
874 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
875 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
876     tm_used->tm_sec);
877 sysadm 1.8
878 sysadm 1.72 BBS_last_access_tm = time(NULL);
879    
880 sysadm 1.14 return 0;
881 sysadm 1.1 }
882    
883 sysadm 1.74 static int bbsnet_refresh()
884 sysadm 1.1 {
885 sysadm 1.14 clearscr();
886     moveto(1, 0);
887 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
888 sysadm 1.20 for (int i = 2; i < 19; i++)
889 sysadm 1.14 {
890     moveto(i, 0);
891 sysadm 1.23 prints("|");
892 sysadm 1.14 moveto(i, 79);
893 sysadm 1.23 prints("|");
894 sysadm 1.14 }
895     moveto(19, 0);
896 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
897 sysadm 1.14 moveto(22, 0);
898 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
899 sysadm 1.14 moveto(23, 0);
900 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
901 sysadm 1.13
902 sysadm 1.14 iflush();
903 sysadm 1.1
904 sysadm 1.14 return 0;
905 sysadm 1.1 }
906    
907 sysadm 1.74 static int bbsnet_selchange()
908 sysadm 1.1 {
909 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
910    
911 sysadm 1.14 moveto(20, 0);
912     clrtoeol();
913 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
914 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
915 sysadm 1.14 moveto(20, 79);
916 sysadm 1.23 prints("|");
917 sysadm 1.14 moveto(21, 0);
918     clrtoeol();
919 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
920 sysadm 1.43 if (bbsnet_conf[i].port != 23)
921 sysadm 1.20 {
922 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
923 sysadm 1.20 }
924 sysadm 1.14 prints("\x1b[m");
925     moveto(21, 79);
926 sysadm 1.23 prints("|");
927 sysadm 1.14 iflush();
928 sysadm 1.1
929 sysadm 1.14 return 0;
930 sysadm 1.1 }
931    
932 sysadm 1.74 extern int bbs_net()
933 sysadm 1.1 {
934 sysadm 1.43 int ch, i;
935 sysadm 1.1
936 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
937 sysadm 1.1
938 sysadm 1.14 clearscr();
939     bbsnet_refresh();
940 sysadm 1.41 display_menu(&bbsnet_menu);
941 sysadm 1.43 bbsnet_selchange();
942 sysadm 1.14
943 sysadm 1.26 while (!SYS_server_exit)
944 sysadm 1.1 {
945 sysadm 1.39 ch = igetch(100);
946 sysadm 1.52
947 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
948     {
949     BBS_last_access_tm = time(NULL);
950     }
951 sysadm 1.64
952 sysadm 1.14 switch (ch)
953     {
954 sysadm 1.47 case KEY_NULL: // broken pipe
955 sysadm 1.64 log_error("KEY_NULL\n");
956 sysadm 1.40 goto cleanup;
957 sysadm 1.14 case KEY_TIMEOUT:
958 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
959 sysadm 1.14 {
960 sysadm 1.64 log_error("User input timeout\n");
961 sysadm 1.40 goto cleanup;
962 sysadm 1.14 }
963 sysadm 1.29 continue;
964 sysadm 1.64 case KEY_ESC:
965     case Ctrl('C'): // user cancel
966     goto cleanup;
967 sysadm 1.14 case CR:
968 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
969 sysadm 1.14 bbsnet_refresh();
970 sysadm 1.41 display_menu(&bbsnet_menu);
971 sysadm 1.43 bbsnet_selchange();
972 sysadm 1.14 break;
973     case KEY_UP:
974     for (i = 0; i < STATION_PER_LINE; i++)
975 sysadm 1.20 {
976 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
977 sysadm 1.20 }
978 sysadm 1.43 bbsnet_selchange();
979 sysadm 1.14 break;
980     case KEY_DOWN:
981     for (i = 0; i < STATION_PER_LINE; i++)
982 sysadm 1.20 {
983 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
984 sysadm 1.20 }
985 sysadm 1.43 bbsnet_selchange();
986 sysadm 1.14 break;
987     case KEY_LEFT:
988     menu_control(&bbsnet_menu, KEY_UP);
989 sysadm 1.43 bbsnet_selchange();
990 sysadm 1.14 break;
991     case KEY_RIGHT:
992     menu_control(&bbsnet_menu, KEY_DOWN);
993 sysadm 1.43 bbsnet_selchange();
994     break;
995 sysadm 1.44 case KEY_HOME:
996 sysadm 1.43 case KEY_PGUP:
997     menu_control(&bbsnet_menu, KEY_PGUP);
998     bbsnet_selchange();
999 sysadm 1.14 break;
1000 sysadm 1.44 case KEY_END:
1001     case KEY_PGDN:
1002     menu_control(&bbsnet_menu, KEY_PGDN);
1003     bbsnet_selchange();
1004     break;
1005 sysadm 1.14 default:
1006     menu_control(&bbsnet_menu, ch);
1007 sysadm 1.43 bbsnet_selchange();
1008 sysadm 1.14 break;
1009     }
1010 sysadm 1.1 }
1011    
1012 sysadm 1.40 cleanup:
1013     unload_bbsnet_conf();
1014    
1015 sysadm 1.14 return 0;
1016 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1