/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.88 - (hide annotations)
Tue Dec 2 08:53:45 2025 UTC (3 months, 2 weeks ago) by sysadm
Branch: MAIN
Changes since 1.87: +1 -1 lines
Content type: text/x-csrc
Update log level of libssh in bbs_net

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.84 #include "str_process.h"
22 sysadm 1.55 #include <errno.h>
23     #include <fcntl.h>
24     #include <netdb.h>
25     #include <stdarg.h>
26 sysadm 1.1 #include <stdio.h>
27 sysadm 1.55 #include <stdlib.h>
28 sysadm 1.29 #include <string.h>
29     #include <time.h>
30     #include <unistd.h>
31 sysadm 1.55 #include <arpa/inet.h>
32 sysadm 1.84 #include <ctype.h>
33 sysadm 1.55 #include <libssh/libssh.h>
34     #include <libssh/server.h>
35     #include <libssh/callbacks.h>
36     #include <netinet/in.h>
37     #include <netinet/ip.h>
38 sysadm 1.29 #include <sys/select.h>
39 sysadm 1.1 #include <sys/ioctl.h>
40     #include <sys/socket.h>
41 sysadm 1.82
42     #ifdef HAVE_SYS_EPOLL_H
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.82 #else
45     #include <poll.h>
46     #endif
47 sysadm 1.1
48 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
49 sysadm 1.26
50 sysadm 1.80 enum _bbs_net_constant_t
51     {
52     MAX_PROCESS_BAR_LEN = 30,
53     MAXSTATION = 26 * 2,
54     STATION_PER_LINE = 4,
55 sysadm 1.84 USERNAME_MAX_LEN = 20,
56     PASSWORD_MAX_LEN = 20,
57 sysadm 1.80 };
58 sysadm 1.1
59     struct _bbsnet_conf
60     {
61 sysadm 1.86 char org_name[40];
62     char site_name[40];
63     char host_name[IP_ADDR_LEN];
64 sysadm 1.24 in_port_t port;
65 sysadm 1.84 int8_t use_ssh;
66 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
67 sysadm 1.1 } bbsnet_conf[MAXSTATION];
68    
69 sysadm 1.74 static MENU_SET bbsnet_menu;
70 sysadm 1.1
71 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
72 sysadm 1.1 {
73 sysadm 1.14 FILE *fp;
74     MENU *p_menu;
75 sysadm 1.41 MENU_ITEM *p_menu_item;
76     MENU_ITEM_ID menu_item_id;
77 sysadm 1.86 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
78 sysadm 1.14
79     fp = fopen(file_config, "r");
80     if (fp == NULL)
81 sysadm 1.20 {
82 sysadm 1.14 return -1;
83 sysadm 1.20 }
84 sysadm 1.14
85 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
86     if (bbsnet_menu.p_menu_pool == NULL)
87     {
88     log_error("calloc(p_menu_pool) error\n");
89     return -3;
90     }
91     bbsnet_menu.menu_count = 1;
92    
93     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
94     if (bbsnet_menu.p_menu_item_pool == NULL)
95     {
96     log_error("calloc(p_menu_item_pool) error\n");
97     return -3;
98     }
99     bbsnet_menu.menu_item_count = MAXSTATION;
100    
101     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
102 sysadm 1.40
103 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
104     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
105 sysadm 1.14 p_menu->title.show = 0;
106 sysadm 1.41 p_menu->screen_show = 0;
107 sysadm 1.1
108 sysadm 1.41 menu_item_id = 0;
109 sysadm 1.86 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
110 sysadm 1.14 {
111 sysadm 1.86 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
112 sysadm 1.26 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
113     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
114     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
115 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
116 sysadm 1.84 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
117 sysadm 1.14
118 sysadm 1.84 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
119 sysadm 1.86 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
120 sysadm 1.18 {
121 sysadm 1.14 continue;
122 sysadm 1.18 }
123    
124 sysadm 1.86 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
125     bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
126     strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
127     bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
128     strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
129     bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
130 sysadm 1.41 bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
131 sysadm 1.84 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
132     strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
133 sysadm 1.60 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
134 sysadm 1.14
135 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
136     if (p_menu_item == NULL)
137     {
138     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
139     return -1;
140     }
141 sysadm 1.14
142 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
143     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
144     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
145     p_menu_item->submenu = 0;
146     p_menu_item->priv = 0;
147     p_menu_item->level = 0;
148     p_menu_item->name[0] =
149     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
150     p_menu_item->name[1] = '\0';
151     snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
152 sysadm 1.86 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
153 sysadm 1.41
154     p_menu->items[p_menu->item_count] = menu_item_id;
155     p_menu->item_count++;
156     menu_item_id++;
157     }
158    
159     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
160     bbsnet_menu.menu_id_path[0] = 0;
161     bbsnet_menu.menu_item_pos[0] = 0;
162     bbsnet_menu.choose_step = 0;
163 sysadm 1.14
164 sysadm 1.41 fclose(fp);
165 sysadm 1.14
166     return 0;
167 sysadm 1.1 }
168    
169 sysadm 1.74 static void unload_bbsnet_conf(void)
170 sysadm 1.40 {
171 sysadm 1.41 bbsnet_menu.menu_count = 0;
172     bbsnet_menu.menu_item_count = 0;
173    
174     free(bbsnet_menu.p_menu_pool);
175     bbsnet_menu.p_menu_pool = NULL;
176     free(bbsnet_menu.p_menu_item_pool);
177     bbsnet_menu.p_menu_item_pool = NULL;
178 sysadm 1.40 }
179    
180 sysadm 1.74 static void process_bar(int n, int len)
181 sysadm 1.1 {
182 sysadm 1.27 char buf[LINE_BUFFER_LEN];
183     char buf2[LINE_BUFFER_LEN];
184    
185     if (len > LINE_BUFFER_LEN)
186     {
187     len = LINE_BUFFER_LEN - 1;
188     }
189     if (n < 0)
190     {
191     n = 0;
192     }
193     else if (n > len)
194     {
195     n = len;
196     }
197 sysadm 1.14
198 sysadm 1.84 moveto(4, 1);
199 sysadm 1.23 prints(" ------------------------------ \r\n");
200 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
201 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
202 sysadm 1.27 buf2[n] = '\0';
203     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
204 sysadm 1.23 prints(" ------------------------------ \r\n");
205 sysadm 1.14 iflush();
206 sysadm 1.1 }
207    
208 sysadm 1.74 static int bbsnet_connect(int n)
209 sysadm 1.1 {
210 sysadm 1.36 int sock, ret, loop, error;
211 sysadm 1.38 int sock_connected = 0;
212 sysadm 1.36 int flags_sock;
213     int flags_stdin;
214     int flags_stdout;
215     int len;
216 sysadm 1.14 struct sockaddr_in sin;
217 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
218     char output_buf[LINE_BUFFER_LEN];
219     int input_buf_len = 0;
220     int output_buf_len = 0;
221     int input_buf_offset = 0;
222     int output_buf_offset = 0;
223 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
224     char output_conv[LINE_BUFFER_LEN * 2];
225     int input_conv_len = 0;
226     int output_conv_len = 0;
227     int input_conv_offset = 0;
228     int output_conv_offset = 0;
229 sysadm 1.67 iconv_t input_cd = NULL;
230 sysadm 1.60 iconv_t output_cd = NULL;
231 sysadm 1.68 char tocode[32];
232 sysadm 1.82
233     #ifdef HAVE_SYS_EPOLL_H
234 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
235 sysadm 1.82 int epollfd;
236     #else
237     struct pollfd pfds[3];
238     #endif
239    
240     int nfds;
241 sysadm 1.38 int stdin_read_wait = 0;
242     int stdout_write_wait = 0;
243     int sock_read_wait = 0;
244     int sock_write_wait = 0;
245 sysadm 1.26 struct hostent *p_host = NULL;
246 sysadm 1.31 int tos;
247 sysadm 1.26 char remote_addr[IP_ADDR_LEN];
248 sysadm 1.14 int remote_port;
249 sysadm 1.63 char local_addr[IP_ADDR_LEN];
250     int local_port;
251     socklen_t sock_len;
252 sysadm 1.56 time_t t_used = time(NULL);
253 sysadm 1.14 struct tm *tm_used;
254 sysadm 1.26 int ch;
255 sysadm 1.84 char remote_user[USERNAME_MAX_LEN + 1];
256     char remote_pass[PASSWORD_MAX_LEN + 1];
257     ssh_session session = NULL;
258     ssh_channel channel = NULL;
259     int ssh_process_config = 0;
260 sysadm 1.88 int ssh_log_level = SSH_LOG_NOLOG;
261 sysadm 1.14
262 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
263     {
264     log_error("user_online_update(BBS_NET) error\n");
265     }
266    
267 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
268     {
269     clearscr();
270    
271     if (!SSH_v2)
272     {
273     moveto(1, 1);
274     prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
275     press_any_key();
276     return 0;
277     }
278    
279     moveto(1, 1);
280 sysadm 1.86 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
281 sysadm 1.84 moveto(2, 1);
282     prints("请输入用户名: ");
283     iflush();
284     if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
285     {
286     return -1;
287     }
288     if (remote_user[0] == '\0')
289     {
290     return 0;
291     }
292    
293     moveto(3, 1);
294     prints("请输入密码: ");
295     iflush();
296     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
297     {
298     return -1;
299     }
300     if (remote_pass[0] == '\0')
301     {
302     return 0;
303     }
304     }
305    
306 sysadm 1.14 clearscr();
307    
308 sysadm 1.84 moveto(1, 1);
309 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
310 sysadm 1.86 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
311 sysadm 1.14 iflush();
312    
313 sysadm 1.86 p_host = gethostbyname(bbsnet_conf[n].host_name);
314 sysadm 1.14
315 sysadm 1.26 if (p_host == NULL)
316 sysadm 1.1 {
317 sysadm 1.57 prints("\033[1;31m查找主机名失败!\033[m\r\n");
318 sysadm 1.14 press_any_key();
319     return -1;
320 sysadm 1.1 }
321 sysadm 1.14
322     sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
323    
324     if (sock < 0)
325 sysadm 1.1 {
326 sysadm 1.57 prints("\033[1;31m无法创建socket!\033[m\r\n");
327 sysadm 1.14 press_any_key();
328     return -1;
329 sysadm 1.1 }
330    
331 sysadm 1.14 sin.sin_family = AF_INET;
332 sysadm 1.48 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
333 sysadm 1.14 sin.sin_port = 0;
334    
335     if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
336     {
337 sysadm 1.31 log_error("Bind address %s:%u failed (%d)\n",
338     inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
339 sysadm 1.14 return -2;
340     }
341 sysadm 1.1
342 sysadm 1.49 memset(&sin, 0, sizeof(sin));
343 sysadm 1.14 sin.sin_family = AF_INET;
344 sysadm 1.26 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
345 sysadm 1.14 sin.sin_port = htons(bbsnet_conf[n].port);
346    
347 sysadm 1.21 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
348     remote_addr[sizeof(remote_addr) - 1] = '\0';
349 sysadm 1.14 remote_port = ntohs(sin.sin_port);
350    
351 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
352 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
353 sysadm 1.29
354 sysadm 1.39 // Set socket as non-blocking
355     flags_sock = fcntl(sock, F_GETFL, 0);
356     fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
357    
358     // Set STDIN/STDOUT as non-blocking
359     flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
360     flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
361     fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
362     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
363    
364 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
365 sysadm 1.38 epollfd = epoll_create1(0);
366     if (epollfd < 0)
367     {
368     log_error("epoll_create1() error (%d)\n", errno);
369     return -1;
370     }
371    
372 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
373 sysadm 1.38 ev.data.fd = sock;
374     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
375     {
376     log_error("epoll_ctl(socket) error (%d)\n", errno);
377 sysadm 1.39 goto cleanup;
378 sysadm 1.38 }
379    
380 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
381 sysadm 1.38 ev.data.fd = STDIN_FILENO;
382     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
383     {
384     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
385 sysadm 1.39 goto cleanup;
386 sysadm 1.38 }
387 sysadm 1.82 #endif
388 sysadm 1.38
389     while (!SYS_server_exit)
390 sysadm 1.29 {
391 sysadm 1.38 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
392 sysadm 1.29 {
393 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
394     {
395     // Use select / epoll to check writability of the socket,
396     // then use getsockopt to check the status of the socket.
397     // See man connect(2)
398     break;
399     }
400     else if (errno == EINTR)
401     {
402     continue;
403     }
404     else
405     {
406     log_error("connect(socket) error (%d)\n", errno);
407 sysadm 1.39
408 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
409 sysadm 1.38 press_any_key();
410 sysadm 1.39
411     goto cleanup;
412 sysadm 1.38 }
413 sysadm 1.29 }
414     }
415    
416 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
417 sysadm 1.1 {
418 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
419 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
420 sysadm 1.82 ret = nfds;
421     #else
422     pfds[0].fd = sock;
423     pfds[0].events = POLLOUT;
424     pfds[1].fd = STDIN_FILENO;
425     pfds[1].events = POLLIN;
426     nfds = 2;
427     ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
428     #endif
429 sysadm 1.29
430 sysadm 1.82 if (ret < 0)
431 sysadm 1.20 {
432 sysadm 1.29 if (errno != EINTR)
433     {
434 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
435 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
436 sysadm 1.82 #else
437     log_error("poll() error (%d)\n", errno);
438     #endif
439 sysadm 1.39 break;
440 sysadm 1.29 }
441 sysadm 1.20 }
442 sysadm 1.82 else if (ret == 0) // timeout
443 sysadm 1.38 {
444     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
445     }
446     else // ret > 0
447 sysadm 1.14 {
448 sysadm 1.38 for (int i = 0; i < nfds; i++)
449 sysadm 1.29 {
450 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
451 sysadm 1.38 if (events[i].data.fd == sock)
452 sysadm 1.82 #else
453     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
454     #endif
455 sysadm 1.38 {
456     len = sizeof(error);
457     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
458     {
459     log_error("getsockopt() error (%d) !\n", error);
460 sysadm 1.39 goto cleanup;
461 sysadm 1.38 }
462     if (error == 0)
463     {
464     sock_connected = 1;
465     }
466     }
467 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
468 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
469 sysadm 1.82 #else
470     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
471     #endif
472 sysadm 1.38 {
473 sysadm 1.84 do
474     {
475     ch = igetch(0);
476     } while (ch == 0);
477 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
478 sysadm 1.38 {
479 sysadm 1.39 goto cleanup;
480 sysadm 1.38 }
481     }
482 sysadm 1.29 }
483 sysadm 1.14 }
484 sysadm 1.12 }
485 sysadm 1.38 if (SYS_server_exit)
486     {
487 sysadm 1.39 goto cleanup;
488 sysadm 1.38 }
489     if (!sock_connected)
490 sysadm 1.12 {
491 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
492 sysadm 1.14 press_any_key();
493 sysadm 1.39
494     goto cleanup;
495 sysadm 1.12 }
496 sysadm 1.29
497 sysadm 1.31 tos = IPTOS_LOWDELAY;
498     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
499     {
500     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
501     }
502 sysadm 1.14
503 sysadm 1.63 sock_len = sizeof(sin);
504     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
505     {
506     log_error("getsockname() error: %d", errno);
507     goto cleanup;
508     }
509    
510     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
511     local_addr[sizeof(local_addr) - 1] = '\0';
512     local_port = ntohs(sin.sin_port);
513    
514 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
515     {
516     session = ssh_new();
517     if (session == NULL)
518     {
519     log_error("ssh_new() error\n");
520     goto cleanup;
521     }
522    
523     if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
524     ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
525 sysadm 1.85 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
526 sysadm 1.86 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
527 sysadm 1.84 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
528     ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
529     ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
530     {
531     log_error("Error setting SSH options: %s\n", ssh_get_error(session));
532     goto cleanup;
533     }
534    
535 sysadm 1.85 ssh_set_blocking(session, 0);
536    
537 sysadm 1.84 while (!SYS_server_exit)
538     {
539     ret = ssh_connect(session);
540     if (ret == SSH_OK)
541     {
542     break;
543     }
544     else if (ret == SSH_ERROR)
545     {
546     log_error("ssh_connect() error\n");
547     goto cleanup;
548     }
549     }
550    
551 sysadm 1.85 ret = ssh_session_is_known_server(session);
552     switch (ret)
553     {
554     case SSH_KNOWN_HOSTS_NOT_FOUND:
555     case SSH_KNOWN_HOSTS_UNKNOWN:
556     if (ssh_session_update_known_hosts(session) != SSH_OK)
557     {
558 sysadm 1.86 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
559 sysadm 1.85 prints("\033[1;31m无法添加服务器证书\033[m");
560     press_any_key();
561     goto cleanup;
562     }
563 sysadm 1.86 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
564 sysadm 1.85 case SSH_KNOWN_HOSTS_OK:
565     break;
566     case SSH_KNOWN_HOSTS_CHANGED:
567     case SSH_KNOWN_HOSTS_OTHER:
568 sysadm 1.86 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
569 sysadm 1.85 prints("\033[1;31m服务器证书已变更\033[m");
570     press_any_key();
571     goto cleanup;
572     }
573 sysadm 1.84
574     for (int i = 0; !SYS_server_exit;)
575     {
576     ret = ssh_userauth_password(session, NULL, remote_pass);
577     if (ret == SSH_AUTH_SUCCESS)
578     {
579     break;
580     }
581     else if (ret == SSH_AUTH_AGAIN)
582     {
583     #ifdef _DEBUG
584     log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
585     #endif
586     }
587     else if (ret == SSH_AUTH_ERROR)
588     {
589     log_error("ssh_userauth_password() error: %d\n", ret);
590     goto cleanup;
591     }
592     else // if (ret == SSH_AUTH_DENIED)
593     {
594     prints("\033[1;31m身份验证失败!\033[m\r\n");
595     i++;
596     if (i < BBS_login_retry_times)
597     {
598     prints("请输入密码: ");
599     iflush();
600     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
601     {
602     goto cleanup;
603     }
604     if (remote_pass[0] == '\0')
605     {
606     goto cleanup;
607     }
608     }
609     else
610     {
611     goto cleanup;
612     }
613     }
614     }
615    
616     channel = ssh_channel_new(session);
617     if (channel == NULL)
618     {
619     log_error("ssh_channel_new() error\n");
620     goto cleanup;
621     }
622    
623     while (!SYS_server_exit)
624     {
625     ret = ssh_channel_open_session(channel);
626     if (ret == SSH_OK)
627     {
628     break;
629     }
630     else if (ret == SSH_ERROR)
631     {
632     log_error("ssh_channel_open_session() error\n");
633     goto cleanup;
634     }
635     }
636    
637     while (!SYS_server_exit)
638     {
639     ret = ssh_channel_request_pty(channel);
640     if (ret == SSH_OK)
641     {
642     break;
643     }
644     else if (ret == SSH_ERROR)
645     {
646     log_error("ssh_channel_request_pty() error\n");
647     goto cleanup;
648     }
649     }
650    
651     while (!SYS_server_exit)
652     {
653     ret = ssh_channel_request_shell(channel);
654     if (ret == SSH_OK)
655     {
656     break;
657     }
658     else if (ret == SSH_ERROR)
659     {
660     log_error("ssh_channel_request_shell() error\n");
661     goto cleanup;
662     }
663     }
664     }
665    
666 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
667 sysadm 1.33 iflush();
668 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
669     remote_addr, remote_port, local_addr, local_port, BBS_username);
670 sysadm 1.14
671 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
672     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
673 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
674 sysadm 1.60 if (input_cd == (iconv_t)(-1))
675     {
676 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
677 sysadm 1.60 goto cleanup;
678     }
679 sysadm 1.68
680 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
681     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
682 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
683 sysadm 1.67 if (output_cd == (iconv_t)(-1))
684 sysadm 1.60 {
685 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
686 sysadm 1.60 iconv_close(input_cd);
687     goto cleanup;
688     }
689    
690 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
691 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
692     ev.data.fd = sock;
693     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
694     {
695     log_error("epoll_ctl(socket) error (%d)\n", errno);
696 sysadm 1.39 goto cleanup;
697 sysadm 1.38 }
698    
699 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
700 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
701     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
702     {
703     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
704 sysadm 1.39 goto cleanup;
705 sysadm 1.38 }
706 sysadm 1.82 #endif
707 sysadm 1.38
708 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
709 sysadm 1.14 loop = 1;
710    
711 sysadm 1.26 while (loop && !SYS_server_exit)
712 sysadm 1.12 {
713 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
714     {
715     log_error("SSH channel is closed\n");
716     loop = 0;
717     break;
718     }
719    
720 sysadm 1.84 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
721     {
722     log_error("Remote SSH channel is closed\n");
723     loop = 0;
724     break;
725     }
726    
727 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
728 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
729 sysadm 1.82 ret = nfds;
730     #else
731     pfds[0].fd = STDIN_FILENO;
732     pfds[0].events = POLLIN;
733     pfds[1].fd = sock;
734     pfds[1].events = POLLIN | POLLOUT;
735     pfds[2].fd = STDOUT_FILENO;
736     pfds[2].events = POLLOUT;
737     nfds = 3;
738     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
739     #endif
740 sysadm 1.33
741 sysadm 1.82 if (ret < 0)
742 sysadm 1.14 {
743 sysadm 1.38 if (errno != EINTR)
744 sysadm 1.14 {
745 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
746 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
747 sysadm 1.82 #else
748     log_error("poll() error (%d)\n", errno);
749     #endif
750 sysadm 1.38 break;
751 sysadm 1.14 }
752 sysadm 1.38 continue;
753 sysadm 1.14 }
754 sysadm 1.82 else if (ret == 0) // timeout
755 sysadm 1.1 {
756 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
757 sysadm 1.28 {
758 sysadm 1.38 break;
759 sysadm 1.28 }
760 sysadm 1.1 }
761 sysadm 1.38
762     for (int i = 0; i < nfds; i++)
763 sysadm 1.1 {
764 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
765 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
766 sysadm 1.82 #else
767     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
768     #endif
769 sysadm 1.14 {
770 sysadm 1.38 stdin_read_wait = 1;
771 sysadm 1.59 }
772    
773 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
774 sysadm 1.59 if (events[i].data.fd == sock)
775 sysadm 1.82 #else
776     if (pfds[i].fd == sock)
777     #endif
778 sysadm 1.59 {
779 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
780 sysadm 1.59 if (events[i].events & EPOLLIN)
781 sysadm 1.82 #else
782     if (pfds[i].revents & POLLIN)
783     #endif
784 sysadm 1.59 {
785     sock_read_wait = 1;
786     }
787 sysadm 1.82
788     #ifdef HAVE_SYS_EPOLL_H
789 sysadm 1.59 if (events[i].events & EPOLLOUT)
790 sysadm 1.82 #else
791     if (pfds[i].revents & POLLOUT)
792     #endif
793 sysadm 1.59 {
794     sock_write_wait = 1;
795     }
796     }
797    
798 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
799 sysadm 1.59 if (events[i].data.fd == STDOUT_FILENO)
800 sysadm 1.82 #else
801     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
802 sysadm 1.84 #endif
803 sysadm 1.59 {
804     stdout_write_wait = 1;
805     }
806     }
807    
808     if (stdin_read_wait)
809     {
810     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
811     {
812     if (SSH_v2)
813 sysadm 1.33 {
814 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
815     if (ret == SSH_ERROR)
816 sysadm 1.47 {
817 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
818     loop = 0;
819     break;
820 sysadm 1.47 }
821 sysadm 1.59 else if (ret == SSH_EOF)
822 sysadm 1.47 {
823 sysadm 1.59 stdin_read_wait = 0;
824     loop = 0;
825     break;
826 sysadm 1.47 }
827 sysadm 1.59 else if (ret == 0)
828 sysadm 1.33 {
829 sysadm 1.72 // Send NO-OP to remote server
830     input_buf[input_buf_len] = '\0';
831     input_buf_len++;
832 sysadm 1.73 BBS_last_access_tm = time(NULL);
833 sysadm 1.72
834 sysadm 1.59 stdin_read_wait = 0;
835     break; // Check whether channel is still open
836 sysadm 1.38 }
837 sysadm 1.59 }
838     else
839     {
840     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
841     }
842     if (ret < 0)
843     {
844     if (errno == EAGAIN || errno == EWOULDBLOCK)
845 sysadm 1.38 {
846     stdin_read_wait = 0;
847     break;
848     }
849 sysadm 1.59 else if (errno == EINTR)
850     {
851     continue;
852     }
853 sysadm 1.38 else
854     {
855 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
856     loop = 0;
857     break;
858     }
859     }
860     else if (ret == 0) // broken pipe
861     {
862     #ifdef _DEBUG
863     log_error("read(STDIN) EOF\n");
864     #endif
865     stdin_read_wait = 0;
866     loop = 0;
867     break;
868     }
869     else
870     {
871     input_buf_len += ret;
872     BBS_last_access_tm = time(NULL);
873 sysadm 1.58
874 sysadm 1.59 // Refresh current action while user input
875     if (user_online_update("BBS_NET") < 0)
876     {
877     log_error("user_online_update(BBS_NET) error\n");
878     }
879 sysadm 1.58
880 sysadm 1.59 continue;
881 sysadm 1.33 }
882 sysadm 1.36 }
883 sysadm 1.59 }
884 sysadm 1.29
885 sysadm 1.59 if (sock_write_wait)
886     {
887 sysadm 1.60 if (input_buf_offset < input_buf_len)
888 sysadm 1.36 {
889 sysadm 1.72 // For debug
890     #ifdef _DEBUG
891     for (int j = input_buf_offset; j < input_buf_len; j++)
892     {
893     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
894     }
895     #endif
896    
897 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
898 sysadm 1.60 if (ret < 0)
899     {
900 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
901 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
902 sysadm 1.60 }
903 sysadm 1.72
904     // For debug
905     #ifdef _DEBUG
906     for (int j = input_conv_offset; j < input_conv_len; j++)
907     {
908     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
909     }
910     #endif
911 sysadm 1.60 }
912    
913     while (input_conv_offset < input_conv_len && !SYS_server_exit)
914     {
915 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
916     {
917     ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
918     if (ret == SSH_ERROR)
919     {
920     log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
921     loop = 0;
922     break;
923     }
924     }
925     else
926     {
927     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
928     }
929 sysadm 1.59 if (ret < 0)
930 sysadm 1.36 {
931 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
932 sysadm 1.36 {
933 sysadm 1.59 sock_write_wait = 0;
934     break;
935 sysadm 1.38 }
936 sysadm 1.59 else if (errno == EINTR)
937 sysadm 1.38 {
938 sysadm 1.59 continue;
939     }
940     else
941     {
942     log_error("write(socket) error (%d)\n", errno);
943 sysadm 1.36 loop = 0;
944 sysadm 1.38 break;
945     }
946 sysadm 1.59 }
947     else if (ret == 0) // broken pipe
948     {
949     #ifdef _DEBUG
950     log_error("write(socket) EOF\n");
951     #endif
952     sock_write_wait = 0;
953     loop = 0;
954     break;
955     }
956     else
957     {
958 sysadm 1.60 input_conv_offset += ret;
959     if (input_conv_offset >= input_conv_len) // Output buffer complete
960 sysadm 1.38 {
961 sysadm 1.60 input_conv_offset = 0;
962     input_conv_len = 0;
963 sysadm 1.59 break;
964 sysadm 1.36 }
965 sysadm 1.59 continue;
966 sysadm 1.36 }
967 sysadm 1.14 }
968 sysadm 1.59 }
969 sysadm 1.36
970 sysadm 1.59 if (sock_read_wait)
971     {
972     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
973 sysadm 1.14 {
974 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
975     {
976     ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
977     (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
978     if (ret == SSH_ERROR)
979     {
980     log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
981     loop = 0;
982     break;
983     }
984     else if (ret == SSH_EOF)
985     {
986     sock_read_wait = 0;
987     loop = 0;
988     break;
989     }
990     else if (ret == 0)
991     {
992     sock_read_wait = 0;
993     break;
994     }
995     }
996     else
997     {
998     ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
999     }
1000 sysadm 1.59 if (ret < 0)
1001 sysadm 1.14 {
1002 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1003 sysadm 1.38 {
1004 sysadm 1.59 sock_read_wait = 0;
1005     break;
1006 sysadm 1.38 }
1007 sysadm 1.59 else if (errno == EINTR)
1008 sysadm 1.33 {
1009 sysadm 1.59 continue;
1010 sysadm 1.38 }
1011     else
1012     {
1013 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
1014     loop = 0;
1015     break;
1016 sysadm 1.33 }
1017     }
1018 sysadm 1.59 else if (ret == 0) // broken pipe
1019     {
1020     #ifdef _DEBUG
1021     log_error("read(socket) EOF\n");
1022     #endif
1023     sock_read_wait = 0;
1024     loop = 0;
1025     break;
1026     }
1027     else
1028     {
1029     output_buf_len += ret;
1030     continue;
1031     }
1032 sysadm 1.36 }
1033 sysadm 1.59 }
1034 sysadm 1.36
1035 sysadm 1.59 if (stdout_write_wait)
1036     {
1037 sysadm 1.60 if (output_buf_offset < output_buf_len)
1038     {
1039 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1040 sysadm 1.60 if (ret < 0)
1041     {
1042 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1043 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
1044 sysadm 1.60 }
1045     }
1046    
1047     while (output_conv_offset < output_conv_len && !SYS_server_exit)
1048 sysadm 1.36 {
1049 sysadm 1.59 if (SSH_v2)
1050 sysadm 1.36 {
1051 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1052 sysadm 1.59 if (ret == SSH_ERROR)
1053 sysadm 1.47 {
1054 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1055     loop = 0;
1056     break;
1057 sysadm 1.47 }
1058 sysadm 1.59 }
1059     else
1060     {
1061 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1062 sysadm 1.59 }
1063     if (ret < 0)
1064     {
1065     if (errno == EAGAIN || errno == EWOULDBLOCK)
1066 sysadm 1.47 {
1067 sysadm 1.59 stdout_write_wait = 0;
1068     break;
1069 sysadm 1.47 }
1070 sysadm 1.59 else if (errno == EINTR)
1071 sysadm 1.38 {
1072 sysadm 1.59 continue;
1073 sysadm 1.38 }
1074 sysadm 1.59 else
1075 sysadm 1.33 {
1076 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
1077 sysadm 1.36 loop = 0;
1078 sysadm 1.38 break;
1079     }
1080 sysadm 1.59 }
1081     else if (ret == 0) // broken pipe
1082     {
1083     #ifdef _DEBUG
1084     log_error("write(STDOUT) EOF\n");
1085     #endif
1086     stdout_write_wait = 0;
1087     loop = 0;
1088     break;
1089     }
1090     else
1091     {
1092 sysadm 1.60 output_conv_offset += ret;
1093     if (output_conv_offset >= output_conv_len) // Output buffer complete
1094 sysadm 1.38 {
1095 sysadm 1.60 output_conv_offset = 0;
1096     output_conv_len = 0;
1097 sysadm 1.59 break;
1098 sysadm 1.36 }
1099 sysadm 1.59 continue;
1100 sysadm 1.36 }
1101 sysadm 1.14 }
1102 sysadm 1.1 }
1103     }
1104    
1105 sysadm 1.60 iconv_close(input_cd);
1106     iconv_close(output_cd);
1107    
1108 sysadm 1.39 cleanup:
1109 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1110 sysadm 1.39 if (close(epollfd) < 0)
1111     {
1112     log_error("close(epoll) error (%d)\n");
1113     }
1114 sysadm 1.82 #endif
1115 sysadm 1.39
1116 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1117     {
1118     ssh_channel_free(channel);
1119     ssh_disconnect(session);
1120     ssh_free(session);
1121     }
1122    
1123 sysadm 1.36 // Restore STDIN/STDOUT flags
1124     fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
1125     fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
1126    
1127 sysadm 1.14 if (close(sock) == -1)
1128     {
1129     log_error("Close socket failed\n");
1130     }
1131 sysadm 1.1
1132 sysadm 1.50 t_used = time(NULL) - t_used;
1133 sysadm 1.14 tm_used = gmtime(&t_used);
1134 sysadm 1.8
1135 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1136 sysadm 1.47 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
1137     tm_used->tm_sec);
1138 sysadm 1.8
1139 sysadm 1.72 BBS_last_access_tm = time(NULL);
1140    
1141 sysadm 1.14 return 0;
1142 sysadm 1.1 }
1143    
1144 sysadm 1.74 static int bbsnet_refresh()
1145 sysadm 1.1 {
1146 sysadm 1.14 clearscr();
1147 sysadm 1.84
1148     moveto(1, 1);
1149     prints(" ------------------------------------------------------------------------------ ");
1150 sysadm 1.20 for (int i = 2; i < 19; i++)
1151 sysadm 1.14 {
1152 sysadm 1.84 moveto(i, 1);
1153 sysadm 1.23 prints("|");
1154 sysadm 1.84 moveto(i, 80);
1155 sysadm 1.23 prints("|");
1156 sysadm 1.14 }
1157 sysadm 1.84 moveto(19, 1);
1158     prints("|------------------------------------------------------------------------------|");
1159     moveto(22, 1);
1160     prints(" ------------------------------------------------------------------------------ ");
1161     moveto(23, 1);
1162     prints(" [\033[1;32mCtrl+C\033[m]退出");
1163 sysadm 1.13
1164 sysadm 1.14 iflush();
1165 sysadm 1.1
1166 sysadm 1.14 return 0;
1167 sysadm 1.1 }
1168    
1169 sysadm 1.74 static int bbsnet_selchange()
1170 sysadm 1.1 {
1171 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
1172    
1173 sysadm 1.84 moveto(20, 1);
1174 sysadm 1.14 clrtoeol();
1175 sysadm 1.87 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1176     bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1177     bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1178     (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1179 sysadm 1.84 moveto(20, 80);
1180 sysadm 1.23 prints("|");
1181 sysadm 1.84 moveto(21, 1);
1182 sysadm 1.14 clrtoeol();
1183 sysadm 1.87 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5d\033[m 编码: \033[1;33m%s\033[m",
1184     bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1185 sysadm 1.84 moveto(21, 80);
1186 sysadm 1.23 prints("|");
1187 sysadm 1.14 iflush();
1188 sysadm 1.1
1189 sysadm 1.14 return 0;
1190 sysadm 1.1 }
1191    
1192 sysadm 1.83 int bbs_net()
1193 sysadm 1.1 {
1194 sysadm 1.43 int ch, i;
1195 sysadm 1.1
1196 sysadm 1.17 load_bbsnet_conf(CONF_BBSNET);
1197 sysadm 1.1
1198 sysadm 1.14 bbsnet_refresh();
1199 sysadm 1.41 display_menu(&bbsnet_menu);
1200 sysadm 1.43 bbsnet_selchange();
1201 sysadm 1.14
1202 sysadm 1.26 while (!SYS_server_exit)
1203 sysadm 1.1 {
1204 sysadm 1.39 ch = igetch(100);
1205 sysadm 1.52
1206 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1207     {
1208     BBS_last_access_tm = time(NULL);
1209     }
1210 sysadm 1.64
1211 sysadm 1.14 switch (ch)
1212     {
1213 sysadm 1.47 case KEY_NULL: // broken pipe
1214 sysadm 1.64 log_error("KEY_NULL\n");
1215 sysadm 1.40 goto cleanup;
1216 sysadm 1.14 case KEY_TIMEOUT:
1217 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1218 sysadm 1.14 {
1219 sysadm 1.64 log_error("User input timeout\n");
1220 sysadm 1.40 goto cleanup;
1221 sysadm 1.14 }
1222 sysadm 1.29 continue;
1223 sysadm 1.64 case KEY_ESC:
1224     case Ctrl('C'): // user cancel
1225     goto cleanup;
1226 sysadm 1.14 case CR:
1227 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1228 sysadm 1.84 // Force cleanup anything remaining in the output buffer
1229     clearscr();
1230     iflush();
1231     // Clear screen and redraw menu
1232 sysadm 1.14 bbsnet_refresh();
1233 sysadm 1.41 display_menu(&bbsnet_menu);
1234 sysadm 1.43 bbsnet_selchange();
1235 sysadm 1.14 break;
1236     case KEY_UP:
1237     for (i = 0; i < STATION_PER_LINE; i++)
1238 sysadm 1.20 {
1239 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
1240 sysadm 1.20 }
1241 sysadm 1.43 bbsnet_selchange();
1242 sysadm 1.14 break;
1243     case KEY_DOWN:
1244     for (i = 0; i < STATION_PER_LINE; i++)
1245 sysadm 1.20 {
1246 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
1247 sysadm 1.20 }
1248 sysadm 1.43 bbsnet_selchange();
1249 sysadm 1.14 break;
1250     case KEY_LEFT:
1251     menu_control(&bbsnet_menu, KEY_UP);
1252 sysadm 1.43 bbsnet_selchange();
1253 sysadm 1.14 break;
1254     case KEY_RIGHT:
1255     menu_control(&bbsnet_menu, KEY_DOWN);
1256 sysadm 1.43 bbsnet_selchange();
1257     break;
1258 sysadm 1.44 case KEY_HOME:
1259 sysadm 1.43 case KEY_PGUP:
1260     menu_control(&bbsnet_menu, KEY_PGUP);
1261     bbsnet_selchange();
1262 sysadm 1.14 break;
1263 sysadm 1.44 case KEY_END:
1264     case KEY_PGDN:
1265     menu_control(&bbsnet_menu, KEY_PGDN);
1266     bbsnet_selchange();
1267     break;
1268 sysadm 1.14 default:
1269     menu_control(&bbsnet_menu, ch);
1270 sysadm 1.43 bbsnet_selchange();
1271 sysadm 1.14 break;
1272     }
1273 sysadm 1.1 }
1274    
1275 sysadm 1.40 cleanup:
1276     unload_bbsnet_conf();
1277    
1278 sysadm 1.14 return 0;
1279 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1