/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.83 - (hide annotations)
Fri Nov 21 07:36:41 2025 UTC (3 months, 3 weeks ago) by sysadm
Branch: MAIN
Changes since 1.82: +2 -1 lines
Content type: text/x-csrc
Use static library for bbs_net and game/chicken while --without-sysv is applied to ./configure

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.55 #include <errno.h>
22     #include <fcntl.h>
23     #include <netdb.h>
24     #include <stdarg.h>
25 sysadm 1.1 #include <stdio.h>
26 sysadm 1.55 #include <stdlib.h>
27 sysadm 1.29 #include <string.h>
28     #include <time.h>
29     #include <unistd.h>
30 sysadm 1.55 #include <arpa/inet.h>
31     #include <libssh/libssh.h>
32     #include <libssh/server.h>
33     #include <libssh/callbacks.h>
34     #include <netinet/in.h>
35     #include <netinet/ip.h>
36 sysadm 1.29 #include <sys/select.h>
37 sysadm 1.1 #include <sys/ioctl.h>
38     #include <sys/socket.h>
39 sysadm 1.82
40     #ifdef HAVE_SYS_EPOLL_H
41 sysadm 1.38 #include <sys/epoll.h>
42 sysadm 1.82 #else
43     #include <poll.h>
44     #endif
45 sysadm 1.1
46 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
47 sysadm 1.26
48 sysadm 1.80 enum _bbs_net_constant_t
49     {
50     MAX_PROCESS_BAR_LEN = 30,
51     MAXSTATION = 26 * 2,
52     STATION_PER_LINE = 4,
53     };
54 sysadm 1.1
55     struct _bbsnet_conf
56     {
57 sysadm 1.14 char host1[20];
58     char host2[40];
59     char ip[40];
60 sysadm 1.24 in_port_t port;
61 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
62 sysadm 1.1 } bbsnet_conf[MAXSTATION];
63    
64 sysadm 1.74 static MENU_SET bbsnet_menu;
65 sysadm 1.1
66 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
67 sysadm 1.1 {
68 sysadm 1.14 FILE *fp;
69     MENU *p_menu;
70 sysadm 1.41 MENU_ITEM *p_menu_item;
71     MENU_ITEM_ID menu_item_id;
72 sysadm 1.60 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
73 sysadm 1.14
74     fp = fopen(file_config, "r");
75     if (fp == NULL)
76 sysadm 1.20 {
77 sysadm 1.14 return -1;
78 sysadm 1.20 }
79 sysadm 1.14
80 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
81     if (bbsnet_menu.p_menu_pool == NULL)
82     {
83     log_error("calloc(p_menu_pool) error\n");
84     return -3;
85     }
86     bbsnet_menu.menu_count = 1;
87    
88     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
89     if (bbsnet_menu.p_menu_item_pool == NULL)
90     {
91     log_error("calloc(p_menu_item_pool) error\n");
92     return -3;
93     }
94     bbsnet_menu.menu_item_count = MAXSTATION;
95    
96     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
97 sysadm 1.40
98 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
99     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
100 sysadm 1.14 p_menu->title.show = 0;
101 sysadm 1.41 p_menu->screen_show = 0;
102 sysadm 1.1
103 sysadm 1.41 menu_item_id = 0;
104     while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
105 sysadm 1.14 {
106 sysadm 1.26 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
107     t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
108     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
109     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
110 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
111 sysadm 1.14
112 sysadm 1.60 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
113 sysadm 1.18 {
114 sysadm 1.14 continue;
115 sysadm 1.18 }
116    
117 sysadm 1.41 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
118     bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
119     strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
120     bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
121     strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
122     bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
123     bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
124 sysadm 1.60 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
125     bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
126 sysadm 1.14
127 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
128     if (p_menu_item == NULL)
129     {
130     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
131     return -1;
132     }
133 sysadm 1.14
134 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
135     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
136     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
137     p_menu_item->submenu = 0;
138     p_menu_item->priv = 0;
139     p_menu_item->level = 0;
140     p_menu_item->name[0] =
141     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
142     p_menu_item->name[1] = '\0';
143     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
144     p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
145    
146     p_menu->items[p_menu->item_count] = menu_item_id;
147     p_menu->item_count++;
148     menu_item_id++;
149     }
150    
151     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
152     bbsnet_menu.menu_id_path[0] = 0;
153     bbsnet_menu.menu_item_pos[0] = 0;
154     bbsnet_menu.choose_step = 0;
155 sysadm 1.14
156 sysadm 1.41 fclose(fp);
157 sysadm 1.14
158     return 0;
159 sysadm 1.1 }
160    
161 sysadm 1.74 static void unload_bbsnet_conf(void)
162 sysadm 1.40 {
163 sysadm 1.41 bbsnet_menu.menu_count = 0;
164     bbsnet_menu.menu_item_count = 0;
165    
166     free(bbsnet_menu.p_menu_pool);
167     bbsnet_menu.p_menu_pool = NULL;
168     free(bbsnet_menu.p_menu_item_pool);
169     bbsnet_menu.p_menu_item_pool = NULL;
170 sysadm 1.40 }
171    
172 sysadm 1.74 static void process_bar(int n, int len)
173 sysadm 1.1 {
174 sysadm 1.27 char buf[LINE_BUFFER_LEN];
175     char buf2[LINE_BUFFER_LEN];
176    
177     if (len > LINE_BUFFER_LEN)
178     {
179     len = LINE_BUFFER_LEN - 1;
180     }
181     if (n < 0)
182     {
183     n = 0;
184     }
185     else if (n > len)
186     {
187     n = len;
188     }
189 sysadm 1.14
190     moveto(4, 0);
191 sysadm 1.23 prints(" ------------------------------ \r\n");
192 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
193 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
194 sysadm 1.27 buf2[n] = '\0';
195     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
196 sysadm 1.23 prints(" ------------------------------ \r\n");
197 sysadm 1.14 iflush();
198 sysadm 1.1 }
199    
200 sysadm 1.74 static int bbsnet_connect(int n)
201 sysadm 1.1 {
202 sysadm 1.36 int sock, ret, loop, error;
203 sysadm 1.38 int sock_connected = 0;
204 sysadm 1.36 int flags_sock;
205     int flags_stdin;
206     int flags_stdout;
207     int len;
208 sysadm 1.14 struct sockaddr_in sin;
209 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
210     char output_buf[LINE_BUFFER_LEN];
211     int input_buf_len = 0;
212     int output_buf_len = 0;
213     int input_buf_offset = 0;
214     int output_buf_offset = 0;
215 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
216     char output_conv[LINE_BUFFER_LEN * 2];
217     int input_conv_len = 0;
218     int output_conv_len = 0;
219     int input_conv_offset = 0;
220     int output_conv_offset = 0;
221 sysadm 1.67 iconv_t input_cd = NULL;
222 sysadm 1.60 iconv_t output_cd = NULL;
223 sysadm 1.68 char tocode[32];
224 sysadm 1.82
225     #ifdef HAVE_SYS_EPOLL_H
226 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
227 sysadm 1.82 int epollfd;
228     #else
229     struct pollfd pfds[3];
230     #endif
231    
232     int nfds;
233 sysadm 1.38 int stdin_read_wait = 0;
234     int stdout_write_wait = 0;
235     int sock_read_wait = 0;
236     int sock_write_wait = 0;
237 sysadm 1.26 struct hostent *p_host = NULL;
238 sysadm 1.31 int tos;
239 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
240 sysadm 1.14 int remote_port;
241 sysadm 1.63 char local_addr[IP_ADDR_LEN];
242     int local_port;
243     socklen_t sock_len;
244 sysadm 1.56 time_t t_used = time(NULL);
245 sysadm 1.14 struct tm *tm_used;
246 sysadm 1.26 int ch;
247 sysadm 1.14
248 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
249     {
250     log_error("user_online_update(BBS_NET) error\n");
251     }
252    
253 sysadm 1.14 clearscr();
254    
255     moveto(0, 0);
256 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
257 sysadm 1.14 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
258     iflush();
259    
260 sysadm 1.26 p_host = gethostbyname(bbsnet_conf[n].ip);
261 sysadm 1.14
262 sysadm 1.26 if (p_host == NULL)
263 sysadm 1.1 {
264 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
265 sysadm 1.14 press_any_key();
266     return -1;
267 sysadm 1.1 }
268 sysadm 1.14
269     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
270    
271     if (sock < 0)
272 sysadm 1.1 {
273 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
274 sysadm 1.14 press_any_key();
275     return -1;
276 sysadm 1.1 }
277    
278 sysadm 1.14 sin.sin_family = AF_INET;
279 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
280 sysadm 1.14 sin.sin_port = 0;
281    
282     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
283     {
284 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
285     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
286 sysadm 1.14 return -2;
287     }
288 sysadm 1.1
289 sysadm 1.49 memset(&sin, 0, sizeof(sin));
290 sysadm 1.14 sin.sin_family = AF_INET;
291 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
292 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
293    
294 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
295     remote_addr[sizeof(remote_addr) - 1] = '\0';
296 sysadm 1.14 remote_port = ntohs(sin.sin_port);
297    
298 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
299 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
300 sysadm 1.29
301 sysadm 1.39 // Set socket as non-blocking
302     flags_sock = fcntl(sock, F_GETFL, 0);
303     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
304    
305     // Set STDIN/STDOUT as non-blocking
306     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
307     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
308     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
309     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
310    
311 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
312 sysadm 1.38 epollfd = epoll_create1(0);
313     if (epollfd < 0)
314     {
315     log_error("epoll_create1() error (%d)\n", errno);
316     return -1;
317     }
318    
319 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
320 sysadm 1.38 ev.data.fd = sock;
321     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
322     {
323     log_error("epoll_ctl(socket) error (%d)\n", errno);
324 sysadm 1.39 goto cleanup;
325 sysadm 1.38 }
326    
327 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
328 sysadm 1.38 ev.data.fd = STDIN_FILENO;
329     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
330     {
331     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
332 sysadm 1.39 goto cleanup;
333 sysadm 1.38 }
334 sysadm 1.82 #endif
335 sysadm 1.38
336     while (!SYS_server_exit)
337 sysadm 1.29 {
338 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
339 sysadm 1.29 {
340 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
341     {
342     // Use select / epoll to check writability of the socket,
343     // then use getsockopt to check the status of the socket.
344     // See man connect(2)
345     break;
346     }
347     else if (errno == EINTR)
348     {
349     continue;
350     }
351     else
352     {
353     log_error("connect(socket) error (%d)\n", errno);
354 sysadm 1.39
355 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
356 sysadm 1.38 press_any_key();
357 sysadm 1.39
358     goto cleanup;
359 sysadm 1.38 }
360 sysadm 1.29 }
361     }
362    
363 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
364 sysadm 1.1 {
365 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
366 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
367 sysadm 1.82 ret = nfds;
368     #else
369     pfds[0].fd = sock;
370     pfds[0].events = POLLOUT;
371     pfds[1].fd = STDIN_FILENO;
372     pfds[1].events = POLLIN;
373     nfds = 2;
374     ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
375     #endif
376 sysadm 1.29
377 sysadm 1.82 if (ret < 0)
378 sysadm 1.20 {
379 sysadm 1.29 if (errno != EINTR)
380     {
381 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
382 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
383 sysadm 1.82 #else
384     log_error("poll() error (%d)\n", errno);
385     #endif
386 sysadm 1.39 break;
387 sysadm 1.29 }
388 sysadm 1.20 }
389 sysadm 1.82 else if (ret == 0) // timeout
390 sysadm 1.38 {
391     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
392     }
393     else // ret > 0
394 sysadm 1.14 {
395 sysadm 1.38 for (int i = 0; i < nfds; i++)
396 sysadm 1.29 {
397 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
398 sysadm 1.38 if (events[i].data.fd == sock)
399 sysadm 1.82 #else
400     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
401     #endif
402 sysadm 1.38 {
403     len = sizeof(error);
404     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
405     {
406     log_error("getsockopt() error (%d) !\n", error);
407 sysadm 1.39 goto cleanup;
408 sysadm 1.38 }
409     if (error == 0)
410     {
411     sock_connected = 1;
412     }
413     }
414 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
415 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
416 sysadm 1.82 #else
417     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
418     #endif
419 sysadm 1.38 {
420     ch = igetch(0);
421 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
422 sysadm 1.38 {
423 sysadm 1.39 goto cleanup;
424 sysadm 1.38 }
425     }
426 sysadm 1.29 }
427 sysadm 1.14 }
428 sysadm 1.12 }
429 sysadm 1.38 if (SYS_server_exit)
430     {
431 sysadm 1.39 goto cleanup;
432 sysadm 1.38 }
433     if (!sock_connected)
434 sysadm 1.12 {
435 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
436 sysadm 1.14 press_any_key();
437 sysadm 1.39
438     goto cleanup;
439 sysadm 1.12 }
440 sysadm 1.29
441 sysadm 1.31 tos = IPTOS_LOWDELAY;
442     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
443     {
444     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
445     }
446 sysadm 1.14
447 sysadm 1.63 sock_len = sizeof(sin);
448     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
449     {
450     log_error("getsockname() error: %d", errno);
451     goto cleanup;
452     }
453    
454     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
455     local_addr[sizeof(local_addr) - 1] = '\0';
456     local_port = ntohs(sin.sin_port);
457    
458 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
459 sysadm 1.33 iflush();
460 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
461     remote_addr, remote_port, local_addr, local_port, BBS_username);
462 sysadm 1.14
463 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
464     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
465 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
466 sysadm 1.60 if (input_cd == (iconv_t)(-1))
467     {
468 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
469 sysadm 1.60 goto cleanup;
470     }
471 sysadm 1.68
472 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
473     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
474 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
475 sysadm 1.67 if (output_cd == (iconv_t)(-1))
476 sysadm 1.60 {
477 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
478 sysadm 1.60 iconv_close(input_cd);
479     goto cleanup;
480     }
481    
482 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
483 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
484     ev.data.fd = sock;
485     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
486     {
487     log_error("epoll_ctl(socket) error (%d)\n", errno);
488 sysadm 1.39 goto cleanup;
489 sysadm 1.38 }
490    
491 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
492 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
493     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
494     {
495     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
496 sysadm 1.39 goto cleanup;
497 sysadm 1.38 }
498 sysadm 1.82 #endif
499 sysadm 1.38
500 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
501 sysadm 1.14 loop = 1;
502    
503 sysadm 1.26 while (loop && !SYS_server_exit)
504 sysadm 1.12 {
505 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
506     {
507     log_error("SSH channel is closed\n");
508     loop = 0;
509     break;
510     }
511    
512 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
513 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
514 sysadm 1.82 ret = nfds;
515     #else
516     pfds[0].fd = STDIN_FILENO;
517     pfds[0].events = POLLIN;
518     pfds[1].fd = sock;
519     pfds[1].events = POLLIN | POLLOUT;
520     pfds[2].fd = STDOUT_FILENO;
521     pfds[2].events = POLLOUT;
522     nfds = 3;
523     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
524     #endif
525 sysadm 1.33
526 sysadm 1.82 if (ret < 0)
527 sysadm 1.14 {
528 sysadm 1.38 if (errno != EINTR)
529 sysadm 1.14 {
530 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
531 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
532 sysadm 1.82 #else
533     log_error("poll() error (%d)\n", errno);
534     #endif
535 sysadm 1.38 break;
536 sysadm 1.14 }
537 sysadm 1.38 continue;
538 sysadm 1.14 }
539 sysadm 1.82 else if (ret == 0) // timeout
540 sysadm 1.1 {
541 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
542 sysadm 1.28 {
543 sysadm 1.38 break;
544 sysadm 1.28 }
545 sysadm 1.1 }
546 sysadm 1.38
547     for (int i = 0; i < nfds; i++)
548 sysadm 1.1 {
549 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
550 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
551 sysadm 1.82 #else
552     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
553     #endif
554 sysadm 1.14 {
555 sysadm 1.38 stdin_read_wait = 1;
556 sysadm 1.59 }
557    
558 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
559 sysadm 1.59 if (events[i].data.fd == sock)
560 sysadm 1.82 #else
561     if (pfds[i].fd == sock)
562     #endif
563 sysadm 1.59 {
564 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
565 sysadm 1.59 if (events[i].events & EPOLLIN)
566 sysadm 1.82 #else
567     if (pfds[i].revents & POLLIN)
568     #endif
569 sysadm 1.59 {
570     sock_read_wait = 1;
571     }
572 sysadm 1.82
573     #ifdef HAVE_SYS_EPOLL_H
574 sysadm 1.59 if (events[i].events & EPOLLOUT)
575 sysadm 1.82 #else
576     if (pfds[i].revents & POLLOUT)
577     #endif
578 sysadm 1.59 {
579     sock_write_wait = 1;
580     }
581     }
582    
583 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
584 sysadm 1.59 if (events[i].data.fd == STDOUT_FILENO)
585 sysadm 1.82 #else
586     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
587     #endif
588 sysadm 1.59 {
589     stdout_write_wait = 1;
590     }
591     }
592    
593     if (stdin_read_wait)
594     {
595     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
596     {
597     if (SSH_v2)
598 sysadm 1.33 {
599 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
600     if (ret == SSH_ERROR)
601 sysadm 1.47 {
602 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
603     loop = 0;
604     break;
605 sysadm 1.47 }
606 sysadm 1.59 else if (ret == SSH_EOF)
607 sysadm 1.47 {
608 sysadm 1.59 stdin_read_wait = 0;
609     loop = 0;
610     break;
611 sysadm 1.47 }
612 sysadm 1.59 else if (ret == 0)
613 sysadm 1.33 {
614 sysadm 1.72 // Send NO-OP to remote server
615     input_buf[input_buf_len] = '\0';
616     input_buf_len++;
617 sysadm 1.73 BBS_last_access_tm = time(NULL);
618 sysadm 1.72
619 sysadm 1.59 stdin_read_wait = 0;
620     break; // Check whether channel is still open
621 sysadm 1.38 }
622 sysadm 1.59 }
623     else
624     {
625     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
626     }
627     if (ret < 0)
628     {
629     if (errno == EAGAIN || errno == EWOULDBLOCK)
630 sysadm 1.38 {
631     stdin_read_wait = 0;
632     break;
633     }
634 sysadm 1.59 else if (errno == EINTR)
635     {
636     continue;
637     }
638 sysadm 1.38 else
639     {
640 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
641     loop = 0;
642     break;
643     }
644     }
645     else if (ret == 0) // broken pipe
646     {
647     #ifdef _DEBUG
648     log_error("read(STDIN) EOF\n");
649     #endif
650     stdin_read_wait = 0;
651     loop = 0;
652     break;
653     }
654     else
655     {
656     input_buf_len += ret;
657     BBS_last_access_tm = time(NULL);
658 sysadm 1.58
659 sysadm 1.59 // Refresh current action while user input
660     if (user_online_update("BBS_NET") < 0)
661     {
662     log_error("user_online_update(BBS_NET) error\n");
663     }
664 sysadm 1.58
665 sysadm 1.59 continue;
666 sysadm 1.33 }
667 sysadm 1.36 }
668 sysadm 1.59 }
669 sysadm 1.29
670 sysadm 1.59 if (sock_write_wait)
671     {
672 sysadm 1.60 if (input_buf_offset < input_buf_len)
673 sysadm 1.36 {
674 sysadm 1.72 // For debug
675     #ifdef _DEBUG
676     for (int j = input_buf_offset; j < input_buf_len; j++)
677     {
678     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
679     }
680     #endif
681    
682 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
683 sysadm 1.60 if (ret < 0)
684     {
685 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
686 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
687 sysadm 1.60 }
688 sysadm 1.72
689     // For debug
690     #ifdef _DEBUG
691     for (int j = input_conv_offset; j < input_conv_len; j++)
692     {
693     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
694     }
695     #endif
696 sysadm 1.60 }
697    
698     while (input_conv_offset < input_conv_len && !SYS_server_exit)
699     {
700     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
701 sysadm 1.59 if (ret < 0)
702 sysadm 1.36 {
703 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
704 sysadm 1.36 {
705 sysadm 1.59 sock_write_wait = 0;
706     break;
707 sysadm 1.38 }
708 sysadm 1.59 else if (errno == EINTR)
709 sysadm 1.38 {
710 sysadm 1.59 continue;
711     }
712     else
713     {
714     log_error("write(socket) error (%d)\n", errno);
715 sysadm 1.36 loop = 0;
716 sysadm 1.38 break;
717     }
718 sysadm 1.59 }
719     else if (ret == 0) // broken pipe
720     {
721     #ifdef _DEBUG
722     log_error("write(socket) EOF\n");
723     #endif
724     sock_write_wait = 0;
725     loop = 0;
726     break;
727     }
728     else
729     {
730 sysadm 1.60 input_conv_offset += ret;
731     if (input_conv_offset >= input_conv_len) // Output buffer complete
732 sysadm 1.38 {
733 sysadm 1.60 input_conv_offset = 0;
734     input_conv_len = 0;
735 sysadm 1.59 break;
736 sysadm 1.36 }
737 sysadm 1.59 continue;
738 sysadm 1.36 }
739 sysadm 1.14 }
740 sysadm 1.59 }
741 sysadm 1.36
742 sysadm 1.59 if (sock_read_wait)
743     {
744     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
745 sysadm 1.14 {
746 sysadm 1.59 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
747     if (ret < 0)
748 sysadm 1.14 {
749 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
750 sysadm 1.38 {
751 sysadm 1.59 sock_read_wait = 0;
752     break;
753 sysadm 1.38 }
754 sysadm 1.59 else if (errno == EINTR)
755 sysadm 1.33 {
756 sysadm 1.59 continue;
757 sysadm 1.38 }
758     else
759     {
760 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
761     loop = 0;
762     break;
763 sysadm 1.33 }
764     }
765 sysadm 1.59 else if (ret == 0) // broken pipe
766     {
767     #ifdef _DEBUG
768     log_error("read(socket) EOF\n");
769     #endif
770     sock_read_wait = 0;
771     loop = 0;
772     break;
773     }
774     else
775     {
776     output_buf_len += ret;
777     continue;
778     }
779 sysadm 1.36 }
780 sysadm 1.59 }
781 sysadm 1.36
782 sysadm 1.59 if (stdout_write_wait)
783     {
784 sysadm 1.60 if (output_buf_offset < output_buf_len)
785     {
786 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
787 sysadm 1.60 if (ret < 0)
788     {
789 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
790 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
791 sysadm 1.60 }
792     }
793    
794     while (output_conv_offset < output_conv_len && !SYS_server_exit)
795 sysadm 1.36 {
796 sysadm 1.59 if (SSH_v2)
797 sysadm 1.36 {
798 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
799 sysadm 1.59 if (ret == SSH_ERROR)
800 sysadm 1.47 {
801 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
802     loop = 0;
803     break;
804 sysadm 1.47 }
805 sysadm 1.59 }
806     else
807     {
808 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
809 sysadm 1.59 }
810     if (ret < 0)
811     {
812     if (errno == EAGAIN || errno == EWOULDBLOCK)
813 sysadm 1.47 {
814 sysadm 1.59 stdout_write_wait = 0;
815     break;
816 sysadm 1.47 }
817 sysadm 1.59 else if (errno == EINTR)
818 sysadm 1.38 {
819 sysadm 1.59 continue;
820 sysadm 1.38 }
821 sysadm 1.59 else
822 sysadm 1.33 {
823 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
824 sysadm 1.36 loop = 0;
825 sysadm 1.38 break;
826     }
827 sysadm 1.59 }
828     else if (ret == 0) // broken pipe
829     {
830     #ifdef _DEBUG
831     log_error("write(STDOUT) EOF\n");
832     #endif
833     stdout_write_wait = 0;
834     loop = 0;
835     break;
836     }
837     else
838     {
839 sysadm 1.60 output_conv_offset += ret;
840     if (output_conv_offset >= output_conv_len) // Output buffer complete
841 sysadm 1.38 {
842 sysadm 1.60 output_conv_offset = 0;
843     output_conv_len = 0;
844 sysadm 1.59 break;
845 sysadm 1.36 }
846 sysadm 1.59 continue;
847 sysadm 1.36 }
848 sysadm 1.14 }
849 sysadm 1.1 }
850     }
851    
852 sysadm 1.60 iconv_close(input_cd);
853     iconv_close(output_cd);
854    
855 sysadm 1.39 cleanup:
856 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
857 sysadm 1.39 if (close(epollfd) < 0)
858     {
859     log_error("close(epoll) error (%d)\n");
860     }
861 sysadm 1.82 #endif
862 sysadm 1.39
863 sysadm 1.36 // Restore STDIN/STDOUT flags
864     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
865     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
866    
867 sysadm 1.14 if (close(sock) == -1)
868     {
869     log_error("Close socket failed\n");
870     }
871 sysadm 1.1
872 sysadm 1.50 t_used = time(NULL) - t_used;
873 sysadm 1.14 tm_used = gmtime(&t_used);
874 sysadm 1.8
875 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
876 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
877     tm_used->tm_sec);
878 sysadm 1.8
879 sysadm 1.72 BBS_last_access_tm = time(NULL);
880    
881 sysadm 1.14 return 0;
882 sysadm 1.1 }
883    
884 sysadm 1.74 static int bbsnet_refresh()
885 sysadm 1.1 {
886 sysadm 1.14 clearscr();
887     moveto(1, 0);
888 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
889 sysadm 1.20 for (int i = 2; i < 19; i++)
890 sysadm 1.14 {
891     moveto(i, 0);
892 sysadm 1.23 prints("|");
893 sysadm 1.14 moveto(i, 79);
894 sysadm 1.23 prints("|");
895 sysadm 1.14 }
896     moveto(19, 0);
897 sysadm 1.23 prints("|-----------------------------------------------------------------------------|");
898 sysadm 1.14 moveto(22, 0);
899 sysadm 1.23 prints(" ----------------------------------------------------------------------------- ");
900 sysadm 1.14 moveto(23, 0);
901 sysadm 1.57 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
902 sysadm 1.13
903 sysadm 1.14 iflush();
904 sysadm 1.1
905 sysadm 1.14 return 0;
906 sysadm 1.1 }
907    
908 sysadm 1.74 static int bbsnet_selchange()
909 sysadm 1.1 {
910 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
911    
912 sysadm 1.14 moveto(20, 0);
913     clrtoeol();
914 sysadm 1.57 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
915 sysadm 1.43 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
916 sysadm 1.14 moveto(20, 79);
917 sysadm 1.23 prints("|");
918 sysadm 1.14 moveto(21, 0);
919     clrtoeol();
920 sysadm 1.57 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
921 sysadm 1.43 if (bbsnet_conf[i].port != 23)
922 sysadm 1.20 {
923 sysadm 1.43 prints(" %d", bbsnet_conf[i].port);
924 sysadm 1.20 }
925 sysadm 1.14 prints("\x1b[m");
926     moveto(21, 79);
927 sysadm 1.23 prints("|");
928 sysadm 1.14 iflush();
929 sysadm 1.1
930 sysadm 1.14 return 0;
931 sysadm 1.1 }
932    
933 sysadm 1.83 int bbs_net()
934 sysadm 1.1 {
935 sysadm 1.43 int ch, i;
936 sysadm 1.1
937 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
938 sysadm 1.1
939 sysadm 1.14 clearscr();
940     bbsnet_refresh();
941 sysadm 1.41 display_menu(&bbsnet_menu);
942 sysadm 1.43 bbsnet_selchange();
943 sysadm 1.14
944 sysadm 1.26 while (!SYS_server_exit)
945 sysadm 1.1 {
946 sysadm 1.39 ch = igetch(100);
947 sysadm 1.52
948 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
949     {
950     BBS_last_access_tm = time(NULL);
951     }
952 sysadm 1.64
953 sysadm 1.14 switch (ch)
954     {
955 sysadm 1.47 case KEY_NULL: // broken pipe
956 sysadm 1.64 log_error("KEY_NULL\n");
957 sysadm 1.40 goto cleanup;
958 sysadm 1.14 case KEY_TIMEOUT:
959 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
960 sysadm 1.14 {
961 sysadm 1.64 log_error("User input timeout\n");
962 sysadm 1.40 goto cleanup;
963 sysadm 1.14 }
964 sysadm 1.29 continue;
965 sysadm 1.64 case KEY_ESC:
966     case Ctrl('C'): // user cancel
967     goto cleanup;
968 sysadm 1.14 case CR:
969 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
970 sysadm 1.14 bbsnet_refresh();
971 sysadm 1.41 display_menu(&bbsnet_menu);
972 sysadm 1.43 bbsnet_selchange();
973 sysadm 1.14 break;
974     case KEY_UP:
975     for (i = 0; i < STATION_PER_LINE; i++)
976 sysadm 1.20 {
977 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
978 sysadm 1.20 }
979 sysadm 1.43 bbsnet_selchange();
980 sysadm 1.14 break;
981     case KEY_DOWN:
982     for (i = 0; i < STATION_PER_LINE; i++)
983 sysadm 1.20 {
984 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
985 sysadm 1.20 }
986 sysadm 1.43 bbsnet_selchange();
987 sysadm 1.14 break;
988     case KEY_LEFT:
989     menu_control(&bbsnet_menu, KEY_UP);
990 sysadm 1.43 bbsnet_selchange();
991 sysadm 1.14 break;
992     case KEY_RIGHT:
993     menu_control(&bbsnet_menu, KEY_DOWN);
994 sysadm 1.43 bbsnet_selchange();
995     break;
996 sysadm 1.44 case KEY_HOME:
997 sysadm 1.43 case KEY_PGUP:
998     menu_control(&bbsnet_menu, KEY_PGUP);
999     bbsnet_selchange();
1000 sysadm 1.14 break;
1001 sysadm 1.44 case KEY_END:
1002     case KEY_PGDN:
1003     menu_control(&bbsnet_menu, KEY_PGDN);
1004     bbsnet_selchange();
1005     break;
1006 sysadm 1.14 default:
1007     menu_control(&bbsnet_menu, ch);
1008 sysadm 1.43 bbsnet_selchange();
1009 sysadm 1.14 break;
1010     }
1011 sysadm 1.1 }
1012    
1013 sysadm 1.40 cleanup:
1014     unload_bbsnet_conf();
1015    
1016 sysadm 1.14 return 0;
1017 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1