/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Annotation of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.93 - (hide annotations)
Thu Dec 18 01:39:32 2025 UTC (2 months, 4 weeks ago) by sysadm
Branch: MAIN
Changes since 1.92: +51 -31 lines
Content type: text/x-csrc
Replace deprecated functions

1 sysadm 1.76 /* SPDX-License-Identifier: GPL-3.0-or-later */
2     /*
3     * bbs_net
4     * - user interactive feature of site shuttle
5     *
6 sysadm 1.77 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 sysadm 1.76 */
8 sysadm 1.1
9 sysadm 1.81 #ifdef HAVE_CONFIG_H
10     #include "config.h"
11     #endif
12    
13 sysadm 1.1 #include "bbs.h"
14 sysadm 1.83 #include "bbs_net.h"
15 sysadm 1.1 #include "common.h"
16 sysadm 1.55 #include "io.h"
17 sysadm 1.15 #include "log.h"
18 sysadm 1.55 #include "login.h"
19     #include "menu.h"
20 sysadm 1.15 #include "screen.h"
21 sysadm 1.84 #include "str_process.h"
22 sysadm 1.55 #include <errno.h>
23     #include <fcntl.h>
24     #include <netdb.h>
25     #include <stdarg.h>
26 sysadm 1.1 #include <stdio.h>
27 sysadm 1.55 #include <stdlib.h>
28 sysadm 1.29 #include <string.h>
29     #include <time.h>
30     #include <unistd.h>
31 sysadm 1.55 #include <arpa/inet.h>
32 sysadm 1.84 #include <ctype.h>
33 sysadm 1.55 #include <libssh/libssh.h>
34     #include <libssh/server.h>
35     #include <libssh/callbacks.h>
36     #include <netinet/in.h>
37     #include <netinet/ip.h>
38 sysadm 1.29 #include <sys/select.h>
39 sysadm 1.1 #include <sys/ioctl.h>
40     #include <sys/socket.h>
41 sysadm 1.82
42     #ifdef HAVE_SYS_EPOLL_H
43 sysadm 1.38 #include <sys/epoll.h>
44 sysadm 1.82 #else
45     #include <poll.h>
46     #endif
47 sysadm 1.1
48 sysadm 1.80 static const char MENU_CONF_DELIM[] = " \t\r\n";
49 sysadm 1.26
50 sysadm 1.80 enum _bbs_net_constant_t
51     {
52     MAX_PROCESS_BAR_LEN = 30,
53     MAXSTATION = 26 * 2,
54     STATION_PER_LINE = 4,
55 sysadm 1.84 USERNAME_MAX_LEN = 20,
56     PASSWORD_MAX_LEN = 20,
57 sysadm 1.90 SSH_CONNECT_TIMEOUT = 5, // seconds
58 sysadm 1.80 };
59 sysadm 1.1
60     struct _bbsnet_conf
61     {
62 sysadm 1.86 char org_name[40];
63     char site_name[40];
64     char host_name[IP_ADDR_LEN];
65 sysadm 1.93 char port[6];
66 sysadm 1.84 int8_t use_ssh;
67 sysadm 1.79 char charset[CHARSET_MAX_LEN + 1];
68 sysadm 1.1 } bbsnet_conf[MAXSTATION];
69    
70 sysadm 1.74 static MENU_SET bbsnet_menu;
71 sysadm 1.1
72 sysadm 1.89 static void unload_bbsnet_conf(void);
73    
74 sysadm 1.74 static int load_bbsnet_conf(const char *file_config)
75 sysadm 1.1 {
76 sysadm 1.14 FILE *fp;
77     MENU *p_menu;
78 sysadm 1.41 MENU_ITEM *p_menu_item;
79     MENU_ITEM_ID menu_item_id;
80 sysadm 1.86 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
81 sysadm 1.89 int port;
82 sysadm 1.14
83 sysadm 1.89 unload_bbsnet_conf();
84 sysadm 1.14
85 sysadm 1.41 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
86     if (bbsnet_menu.p_menu_pool == NULL)
87     {
88     log_error("calloc(p_menu_pool) error\n");
89 sysadm 1.89 return -1;
90 sysadm 1.41 }
91     bbsnet_menu.menu_count = 1;
92    
93     bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
94     if (bbsnet_menu.p_menu_item_pool == NULL)
95     {
96     log_error("calloc(p_menu_item_pool) error\n");
97 sysadm 1.89 unload_bbsnet_conf();
98     return -1;
99 sysadm 1.41 }
100     bbsnet_menu.menu_item_count = MAXSTATION;
101    
102     p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
103 sysadm 1.40
104 sysadm 1.21 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
105     p_menu->name[sizeof(p_menu->name) - 1] = '\0';
106 sysadm 1.14 p_menu->title.show = 0;
107 sysadm 1.41 p_menu->screen_show = 0;
108 sysadm 1.1
109 sysadm 1.89 fp = fopen(file_config, "r");
110     if (fp == NULL)
111     {
112     unload_bbsnet_conf();
113     return -2;
114     }
115    
116 sysadm 1.41 menu_item_id = 0;
117 sysadm 1.86 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
118 sysadm 1.14 {
119 sysadm 1.86 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
120 sysadm 1.26 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
121     t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
122     t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123 sysadm 1.60 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124 sysadm 1.84 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
125 sysadm 1.14
126 sysadm 1.84 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
127 sysadm 1.86 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
128 sysadm 1.18 {
129 sysadm 1.14 continue;
130 sysadm 1.18 }
131    
132 sysadm 1.86 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
133     bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
134     strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
135     bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
136     strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
137     bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
138 sysadm 1.89 port = atoi(t4);
139     if (port <= 0 || port > 65535)
140     {
141     log_error("Invalid port value %d of menu item %d\n", port, menu_item_id);
142     fclose(fp);
143     unload_bbsnet_conf();
144     return -3;
145     }
146 sysadm 1.93 strncpy(bbsnet_conf[menu_item_id].port, t4, sizeof(bbsnet_conf[menu_item_id].port) - 1);
147     bbsnet_conf[menu_item_id].port[sizeof(bbsnet_conf[menu_item_id].port) - 1] = '\0';
148 sysadm 1.84 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
149     strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
150 sysadm 1.60 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
151 sysadm 1.14
152 sysadm 1.41 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
153     if (p_menu_item == NULL)
154     {
155     log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
156 sysadm 1.89 fclose(fp);
157     unload_bbsnet_conf();
158     return -3;
159 sysadm 1.41 }
160 sysadm 1.14
161 sysadm 1.41 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
162     p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
163     snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
164     p_menu_item->submenu = 0;
165     p_menu_item->priv = 0;
166     p_menu_item->level = 0;
167     p_menu_item->name[0] =
168     (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
169     p_menu_item->name[1] = '\0';
170 sysadm 1.89 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
171 sysadm 1.86 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
172 sysadm 1.41
173     p_menu->items[p_menu->item_count] = menu_item_id;
174     p_menu->item_count++;
175     menu_item_id++;
176     }
177    
178     bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
179     bbsnet_menu.menu_id_path[0] = 0;
180     bbsnet_menu.menu_item_pos[0] = 0;
181     bbsnet_menu.choose_step = 0;
182 sysadm 1.14
183 sysadm 1.41 fclose(fp);
184 sysadm 1.14
185     return 0;
186 sysadm 1.1 }
187    
188 sysadm 1.74 static void unload_bbsnet_conf(void)
189 sysadm 1.40 {
190 sysadm 1.41 bbsnet_menu.menu_count = 0;
191     bbsnet_menu.menu_item_count = 0;
192    
193 sysadm 1.89 if (bbsnet_menu.p_menu_pool)
194     {
195     free(bbsnet_menu.p_menu_pool);
196     bbsnet_menu.p_menu_pool = NULL;
197     }
198    
199     if (bbsnet_menu.p_menu_item_pool)
200     {
201     free(bbsnet_menu.p_menu_item_pool);
202     bbsnet_menu.p_menu_item_pool = NULL;
203     }
204 sysadm 1.40 }
205    
206 sysadm 1.74 static void process_bar(int n, int len)
207 sysadm 1.1 {
208 sysadm 1.27 char buf[LINE_BUFFER_LEN];
209     char buf2[LINE_BUFFER_LEN];
210    
211 sysadm 1.89 if (len <= 0)
212     {
213     len = 1;
214     }
215     else if (len > LINE_BUFFER_LEN)
216 sysadm 1.27 {
217     len = LINE_BUFFER_LEN - 1;
218     }
219     if (n < 0)
220     {
221     n = 0;
222     }
223     else if (n > len)
224     {
225     n = len;
226     }
227 sysadm 1.14
228 sysadm 1.84 moveto(4, 1);
229 sysadm 1.23 prints(" ------------------------------ \r\n");
230 sysadm 1.27 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
231 sysadm 1.75 memcpy(buf2, buf, (size_t)n);
232 sysadm 1.27 buf2[n] = '\0';
233     prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
234 sysadm 1.23 prints(" ------------------------------ \r\n");
235 sysadm 1.14 iflush();
236 sysadm 1.1 }
237    
238 sysadm 1.74 static int bbsnet_connect(int n)
239 sysadm 1.1 {
240 sysadm 1.89 int sock = -1;
241     int ret;
242     int loop;
243     int error;
244 sysadm 1.38 int sock_connected = 0;
245 sysadm 1.89 int flags_sock = -1;
246     int flags_stdin = -1;
247     int flags_stdout = -1;
248 sysadm 1.14 struct sockaddr_in sin;
249 sysadm 1.36 char input_buf[LINE_BUFFER_LEN];
250     char output_buf[LINE_BUFFER_LEN];
251     int input_buf_len = 0;
252     int output_buf_len = 0;
253     int input_buf_offset = 0;
254     int output_buf_offset = 0;
255 sysadm 1.60 char input_conv[LINE_BUFFER_LEN * 2];
256     char output_conv[LINE_BUFFER_LEN * 2];
257     int input_conv_len = 0;
258     int output_conv_len = 0;
259     int input_conv_offset = 0;
260     int output_conv_offset = 0;
261 sysadm 1.89 iconv_t input_cd = (iconv_t)(-1);
262     iconv_t output_cd = (iconv_t)(-1);
263     char tocode[CHARSET_MAX_LEN + 20];
264 sysadm 1.82
265     #ifdef HAVE_SYS_EPOLL_H
266 sysadm 1.38 struct epoll_event ev, events[MAX_EVENTS];
267 sysadm 1.89 int epollfd = -1;
268 sysadm 1.82 #else
269     struct pollfd pfds[3];
270     #endif
271    
272     int nfds;
273 sysadm 1.38 int stdin_read_wait = 0;
274     int stdout_write_wait = 0;
275     int sock_read_wait = 0;
276     int sock_write_wait = 0;
277 sysadm 1.93 struct addrinfo hints, *res = NULL;
278 sysadm 1.31 int tos;
279 sysadm 1.93 char remote_addr[INET_ADDRSTRLEN];
280 sysadm 1.14 int remote_port;
281 sysadm 1.93 char local_addr[INET_ADDRSTRLEN];
282 sysadm 1.63 int local_port;
283     socklen_t sock_len;
284 sysadm 1.90 time_t t_begin;
285 sysadm 1.56 time_t t_used = time(NULL);
286 sysadm 1.14 struct tm *tm_used;
287 sysadm 1.26 int ch;
288 sysadm 1.84 char remote_user[USERNAME_MAX_LEN + 1];
289     char remote_pass[PASSWORD_MAX_LEN + 1];
290     ssh_session session = NULL;
291     ssh_channel channel = NULL;
292     int ssh_process_config = 0;
293 sysadm 1.88 int ssh_log_level = SSH_LOG_NOLOG;
294 sysadm 1.14
295 sysadm 1.53 if (user_online_update("BBS_NET") < 0)
296     {
297     log_error("user_online_update(BBS_NET) error\n");
298     }
299    
300 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
301     {
302     clearscr();
303    
304     if (!SSH_v2)
305     {
306     moveto(1, 1);
307     prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
308     press_any_key();
309     return 0;
310     }
311    
312     moveto(1, 1);
313 sysadm 1.86 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
314 sysadm 1.84 moveto(2, 1);
315     prints("请输入用户名: ");
316     iflush();
317     if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
318     {
319     return -1;
320     }
321     if (remote_user[0] == '\0')
322     {
323     return 0;
324     }
325    
326     moveto(3, 1);
327     prints("请输入密码: ");
328     iflush();
329     if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
330     {
331     return -1;
332     }
333     if (remote_pass[0] == '\0')
334     {
335     return 0;
336     }
337     }
338    
339 sysadm 1.14 clearscr();
340    
341 sysadm 1.84 moveto(1, 1);
342 sysadm 1.57 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
343 sysadm 1.86 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
344 sysadm 1.14 iflush();
345    
346 sysadm 1.93 memset(&hints, 0, sizeof(hints));
347     hints.ai_family = AF_INET;
348     hints.ai_socktype = SOCK_STREAM;
349     hints.ai_protocol = IPPROTO_TCP;
350 sysadm 1.14
351 sysadm 1.93 if ((ret = getaddrinfo(BBS_address, NULL, &hints, &res)) != 0)
352 sysadm 1.1 {
353 sysadm 1.93 log_error("getaddrinfo() error (%d)\n", ret);
354 sysadm 1.89 goto cleanup;
355 sysadm 1.1 }
356 sysadm 1.14
357 sysadm 1.93 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr), local_addr, sizeof(local_addr)) == NULL)
358     {
359     log_error("inet_ntop() error (%d)\n", errno);
360     goto cleanup;
361     }
362     local_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
363 sysadm 1.14
364 sysadm 1.93 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
365 sysadm 1.14 if (sock < 0)
366 sysadm 1.1 {
367 sysadm 1.93 log_error("socket() error (%d)\n", errno);
368     goto cleanup;
369     }
370    
371     if (bind(sock, res->ai_addr, res->ai_addrlen) < 0)
372     {
373     log_error("bind(%s:%u) error (%d)\n", local_addr, local_port, errno);
374 sysadm 1.89 goto cleanup;
375 sysadm 1.1 }
376    
377 sysadm 1.93 freeaddrinfo(res);
378     res = NULL;
379    
380     memset(&hints, 0, sizeof(hints));
381     hints.ai_family = AF_INET;
382     hints.ai_flags = AI_NUMERICSERV;
383     hints.ai_socktype = SOCK_STREAM;
384     hints.ai_protocol = IPPROTO_TCP;
385 sysadm 1.14
386 sysadm 1.93 if ((ret = getaddrinfo(bbsnet_conf[n].host_name, bbsnet_conf[n].port, &hints, &res)) != 0)
387 sysadm 1.14 {
388 sysadm 1.93 log_error("getaddrinfo() error (%d)\n", ret);
389     prints("\033[1;31m查找主机名失败!\033[m\r\n");
390     press_any_key();
391 sysadm 1.89 goto cleanup;
392 sysadm 1.14 }
393 sysadm 1.1
394 sysadm 1.93 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr), remote_addr, sizeof(remote_addr)) == NULL)
395     {
396     log_error("inet_ntop() error (%d)\n", errno);
397     goto cleanup;
398     }
399     remote_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
400 sysadm 1.14
401 sysadm 1.57 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
402 sysadm 1.14 process_bar(0, MAX_PROCESS_BAR_LEN);
403 sysadm 1.29
404 sysadm 1.39 // Set socket as non-blocking
405 sysadm 1.89 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
406     {
407     log_error("fcntl(F_GETFL) error (%d)\n", errno);
408     goto cleanup;
409     }
410     if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
411     {
412     log_error("fcntl(F_SETFL) error (%d)\n", errno);
413     goto cleanup;
414     }
415 sysadm 1.39
416     // Set STDIN/STDOUT as non-blocking
417 sysadm 1.89 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
418     {
419     log_error("fcntl(F_GETFL) error (%d)\n", errno);
420     goto cleanup;
421     }
422     if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
423     {
424     log_error("fcntl(F_GETFL) error (%d)\n", errno);
425     goto cleanup;
426     }
427     if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
428     {
429     log_error("fcntl(F_SETFL) error (%d)\n", errno);
430     goto cleanup;
431     }
432     if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
433     {
434     log_error("fcntl(F_SETFL) error (%d)\n", errno);
435     goto cleanup;
436     }
437 sysadm 1.39
438 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
439 sysadm 1.38 epollfd = epoll_create1(0);
440     if (epollfd < 0)
441     {
442     log_error("epoll_create1() error (%d)\n", errno);
443 sysadm 1.89 goto cleanup;
444 sysadm 1.38 }
445    
446 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
447 sysadm 1.38 ev.data.fd = sock;
448     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
449     {
450     log_error("epoll_ctl(socket) error (%d)\n", errno);
451 sysadm 1.39 goto cleanup;
452 sysadm 1.38 }
453    
454 sysadm 1.59 ev.events = EPOLLIN | EPOLLET;
455 sysadm 1.38 ev.data.fd = STDIN_FILENO;
456     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
457     {
458     log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
459 sysadm 1.39 goto cleanup;
460 sysadm 1.38 }
461 sysadm 1.82 #endif
462 sysadm 1.38
463     while (!SYS_server_exit)
464 sysadm 1.29 {
465 sysadm 1.93 if ((ret = connect(sock, res->ai_addr, res->ai_addrlen)) < 0)
466 sysadm 1.29 {
467 sysadm 1.38 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
468     {
469     // Use select / epoll to check writability of the socket,
470     // then use getsockopt to check the status of the socket.
471     // See man connect(2)
472     break;
473     }
474     else if (errno == EINTR)
475     {
476     continue;
477     }
478     else
479     {
480     log_error("connect(socket) error (%d)\n", errno);
481 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
482 sysadm 1.38 press_any_key();
483 sysadm 1.39 goto cleanup;
484 sysadm 1.38 }
485 sysadm 1.29 }
486     }
487    
488 sysadm 1.38 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
489 sysadm 1.1 {
490 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
491 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
492 sysadm 1.82 ret = nfds;
493     #else
494     pfds[0].fd = sock;
495     pfds[0].events = POLLOUT;
496     pfds[1].fd = STDIN_FILENO;
497     pfds[1].events = POLLIN;
498     nfds = 2;
499     ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
500     #endif
501 sysadm 1.29
502 sysadm 1.82 if (ret < 0)
503 sysadm 1.20 {
504 sysadm 1.29 if (errno != EINTR)
505     {
506 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
507 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
508 sysadm 1.82 #else
509     log_error("poll() error (%d)\n", errno);
510     #endif
511 sysadm 1.39 break;
512 sysadm 1.29 }
513 sysadm 1.20 }
514 sysadm 1.82 else if (ret == 0) // timeout
515 sysadm 1.38 {
516     process_bar(j + 1, MAX_PROCESS_BAR_LEN);
517     }
518     else // ret > 0
519 sysadm 1.14 {
520 sysadm 1.38 for (int i = 0; i < nfds; i++)
521 sysadm 1.29 {
522 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
523 sysadm 1.38 if (events[i].data.fd == sock)
524 sysadm 1.82 #else
525     if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
526     #endif
527 sysadm 1.38 {
528 sysadm 1.89 socklen_t len = sizeof(error);
529     if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
530 sysadm 1.38 {
531 sysadm 1.89 log_error("getsockopt() error (%d) !\n", errno);
532 sysadm 1.39 goto cleanup;
533 sysadm 1.38 }
534     if (error == 0)
535     {
536     sock_connected = 1;
537     }
538     }
539 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
540 sysadm 1.38 else if (events[i].data.fd == STDIN_FILENO)
541 sysadm 1.82 #else
542     else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
543     #endif
544 sysadm 1.38 {
545 sysadm 1.84 do
546     {
547     ch = igetch(0);
548     } while (ch == 0);
549 sysadm 1.45 if (ch == Ctrl('C') || ch == KEY_ESC)
550 sysadm 1.38 {
551 sysadm 1.39 goto cleanup;
552 sysadm 1.38 }
553     }
554 sysadm 1.29 }
555 sysadm 1.14 }
556 sysadm 1.12 }
557 sysadm 1.38 if (SYS_server_exit)
558     {
559 sysadm 1.39 goto cleanup;
560 sysadm 1.38 }
561     if (!sock_connected)
562 sysadm 1.12 {
563 sysadm 1.57 prints("\033[1;31m连接失败!\033[m\r\n");
564 sysadm 1.14 press_any_key();
565 sysadm 1.39 goto cleanup;
566 sysadm 1.12 }
567 sysadm 1.29
568 sysadm 1.31 tos = IPTOS_LOWDELAY;
569     if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
570     {
571     log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
572     }
573 sysadm 1.14
574 sysadm 1.63 sock_len = sizeof(sin);
575     if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
576     {
577     log_error("getsockname() error: %d", errno);
578     goto cleanup;
579     }
580    
581     strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
582     local_addr[sizeof(local_addr) - 1] = '\0';
583     local_port = ntohs(sin.sin_port);
584    
585 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
586     {
587     session = ssh_new();
588     if (session == NULL)
589     {
590     log_error("ssh_new() error\n");
591     goto cleanup;
592     }
593    
594     if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
595     ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
596 sysadm 1.85 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
597 sysadm 1.86 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
598 sysadm 1.84 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
599     ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
600     ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
601     {
602     log_error("Error setting SSH options: %s\n", ssh_get_error(session));
603     goto cleanup;
604     }
605    
606 sysadm 1.90 ssh_set_blocking(session, 0);
607 sysadm 1.85
608 sysadm 1.90 t_begin = time(NULL);
609     ret = SSH_ERROR;
610     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
611 sysadm 1.84 {
612     ret = ssh_connect(session);
613     if (ret == SSH_OK)
614     {
615     break;
616     }
617 sysadm 1.90 else if (ret == SSH_AGAIN)
618     {
619     // log_error("ssh_connect() error: SSH_AGAIN\n");
620     }
621     else // if (ret == SSH_ERROR)
622 sysadm 1.84 {
623 sysadm 1.90 log_error("ssh_connect() error: SSH_ERROR\n");
624 sysadm 1.84 goto cleanup;
625     }
626     }
627 sysadm 1.90 if (ret != SSH_OK)
628     {
629     prints("\033[1;31m连接超时!\033[m\r\n");
630     press_any_key();
631     goto cleanup;
632     }
633 sysadm 1.84
634 sysadm 1.85 ret = ssh_session_is_known_server(session);
635     switch (ret)
636     {
637     case SSH_KNOWN_HOSTS_NOT_FOUND:
638     case SSH_KNOWN_HOSTS_UNKNOWN:
639     if (ssh_session_update_known_hosts(session) != SSH_OK)
640     {
641 sysadm 1.86 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
642 sysadm 1.90 prints("\033[1;31m无法添加服务器证书\033[m\r\n");
643 sysadm 1.85 press_any_key();
644     goto cleanup;
645     }
646 sysadm 1.86 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
647 sysadm 1.85 case SSH_KNOWN_HOSTS_OK:
648     break;
649     case SSH_KNOWN_HOSTS_CHANGED:
650     case SSH_KNOWN_HOSTS_OTHER:
651 sysadm 1.86 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
652 sysadm 1.90 prints("\033[1;31m服务器证书已变更\033[m\r\n");
653 sysadm 1.85 press_any_key();
654     goto cleanup;
655     }
656 sysadm 1.84
657 sysadm 1.90 ret = SSH_AUTH_ERROR;
658     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
659 sysadm 1.84 {
660     ret = ssh_userauth_password(session, NULL, remote_pass);
661     if (ret == SSH_AUTH_SUCCESS)
662     {
663     break;
664     }
665     else if (ret == SSH_AUTH_AGAIN)
666     {
667 sysadm 1.90 // log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
668 sysadm 1.84 }
669     else if (ret == SSH_AUTH_ERROR)
670     {
671 sysadm 1.90 log_error("ssh_userauth_password() error: SSH_AUTH_ERROR\n");
672 sysadm 1.84 goto cleanup;
673     }
674     else // if (ret == SSH_AUTH_DENIED)
675     {
676 sysadm 1.90 log_error("ssh_userauth_password() error: SSH_AUTH_DENIED\n");
677 sysadm 1.84 prints("\033[1;31m身份验证失败!\033[m\r\n");
678 sysadm 1.90 press_any_key();
679     goto cleanup;
680 sysadm 1.84 }
681     }
682 sysadm 1.90 if (ret != SSH_AUTH_SUCCESS)
683     {
684     prints("\033[1;31m连接超时!\033[m\r\n");
685     press_any_key();
686     goto cleanup;
687     }
688 sysadm 1.84
689     channel = ssh_channel_new(session);
690     if (channel == NULL)
691     {
692     log_error("ssh_channel_new() error\n");
693     goto cleanup;
694     }
695    
696 sysadm 1.90 ret = SSH_ERROR;
697     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
698 sysadm 1.84 {
699     ret = ssh_channel_open_session(channel);
700     if (ret == SSH_OK)
701     {
702     break;
703     }
704 sysadm 1.90 else if (ret == SSH_AGAIN)
705     {
706     // log_error("ssh_channel_open_session() error: SSH_AGAIN\n");
707     }
708     else // if (ret == SSH_ERROR)
709 sysadm 1.84 {
710 sysadm 1.90 log_error("ssh_channel_open_session() error: SSH_ERROR\n");
711 sysadm 1.84 goto cleanup;
712     }
713     }
714 sysadm 1.90 if (ret != SSH_OK)
715     {
716     prints("\033[1;31m连接超时!\033[m\r\n");
717     press_any_key();
718     goto cleanup;
719     }
720 sysadm 1.84
721 sysadm 1.90 ret = SSH_ERROR;
722     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
723 sysadm 1.84 {
724     ret = ssh_channel_request_pty(channel);
725     if (ret == SSH_OK)
726     {
727     break;
728     }
729 sysadm 1.90 else if (ret == SSH_AGAIN)
730     {
731     // log_error("ssh_channel_request_pty() error: SSH_AGAIN\n");
732     }
733     else // if (ret == SSH_ERROR)
734 sysadm 1.84 {
735 sysadm 1.90 log_error("ssh_channel_request_pty() error: SSH_ERROR\n");
736 sysadm 1.84 goto cleanup;
737     }
738     }
739 sysadm 1.90 if (ret != SSH_OK)
740     {
741     prints("\033[1;31m连接超时!\033[m\r\n");
742     press_any_key();
743     goto cleanup;
744     }
745 sysadm 1.84
746 sysadm 1.90 ret = SSH_ERROR;
747     while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
748 sysadm 1.84 {
749     ret = ssh_channel_request_shell(channel);
750     if (ret == SSH_OK)
751     {
752     break;
753     }
754 sysadm 1.90 else if (ret == SSH_AGAIN)
755     {
756     // log_error("ssh_channel_request_shell() error: SSH_AGAIN\n");
757     }
758     else // if (ret == SSH_ERROR)
759 sysadm 1.84 {
760 sysadm 1.90 log_error("ssh_channel_request_shell() error: SSH_ERROR\n");
761 sysadm 1.84 goto cleanup;
762     }
763     }
764 sysadm 1.90 if (ret != SSH_OK)
765 sysadm 1.89 {
766 sysadm 1.90 prints("\033[1;31m连接超时!\033[m\r\n");
767     press_any_key();
768 sysadm 1.89 goto cleanup;
769     }
770 sysadm 1.84 }
771    
772 sysadm 1.57 prints("\033[1;31m连接成功!\033[m\r\n");
773 sysadm 1.33 iflush();
774 sysadm 1.63 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
775     remote_addr, remote_port, local_addr, local_port, BBS_username);
776 sysadm 1.14
777 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
778     (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
779 sysadm 1.68 input_cd = iconv_open(tocode, stdio_charset);
780 sysadm 1.60 if (input_cd == (iconv_t)(-1))
781     {
782 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
783 sysadm 1.60 goto cleanup;
784     }
785 sysadm 1.68
786 sysadm 1.71 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
787     (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
788 sysadm 1.70 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
789 sysadm 1.67 if (output_cd == (iconv_t)(-1))
790 sysadm 1.60 {
791 sysadm 1.68 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
792 sysadm 1.60 goto cleanup;
793     }
794    
795 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
796 sysadm 1.38 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
797     ev.data.fd = sock;
798     if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
799     {
800     log_error("epoll_ctl(socket) error (%d)\n", errno);
801 sysadm 1.39 goto cleanup;
802 sysadm 1.38 }
803    
804 sysadm 1.59 ev.events = EPOLLOUT | EPOLLET;
805 sysadm 1.38 ev.data.fd = STDOUT_FILENO;
806     if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
807     {
808     log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
809 sysadm 1.39 goto cleanup;
810 sysadm 1.38 }
811 sysadm 1.82 #endif
812 sysadm 1.38
813 sysadm 1.50 BBS_last_access_tm = t_used = time(NULL);
814 sysadm 1.14 loop = 1;
815    
816 sysadm 1.26 while (loop && !SYS_server_exit)
817 sysadm 1.12 {
818 sysadm 1.47 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
819     {
820 sysadm 1.92 #ifdef _DEBUG
821 sysadm 1.47 log_error("SSH channel is closed\n");
822 sysadm 1.92 #endif
823 sysadm 1.47 loop = 0;
824     break;
825     }
826    
827 sysadm 1.84 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
828     {
829 sysadm 1.92 #ifdef _DEBUG
830 sysadm 1.84 log_error("Remote SSH channel is closed\n");
831 sysadm 1.92 #endif
832 sysadm 1.84 loop = 0;
833     break;
834     }
835    
836 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
837 sysadm 1.38 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
838 sysadm 1.82 ret = nfds;
839     #else
840     pfds[0].fd = STDIN_FILENO;
841     pfds[0].events = POLLIN;
842     pfds[1].fd = sock;
843     pfds[1].events = POLLIN | POLLOUT;
844     pfds[2].fd = STDOUT_FILENO;
845     pfds[2].events = POLLOUT;
846     nfds = 3;
847     ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
848     #endif
849 sysadm 1.33
850 sysadm 1.82 if (ret < 0)
851 sysadm 1.14 {
852 sysadm 1.38 if (errno != EINTR)
853 sysadm 1.14 {
854 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
855 sysadm 1.38 log_error("epoll_wait() error (%d)\n", errno);
856 sysadm 1.82 #else
857     log_error("poll() error (%d)\n", errno);
858     #endif
859 sysadm 1.38 break;
860 sysadm 1.14 }
861 sysadm 1.38 continue;
862 sysadm 1.14 }
863 sysadm 1.82 else if (ret == 0) // timeout
864 sysadm 1.1 {
865 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
866 sysadm 1.28 {
867 sysadm 1.38 break;
868 sysadm 1.28 }
869 sysadm 1.1 }
870 sysadm 1.38
871     for (int i = 0; i < nfds; i++)
872 sysadm 1.1 {
873 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
874 sysadm 1.59 if (events[i].data.fd == STDIN_FILENO)
875 sysadm 1.82 #else
876     if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
877     #endif
878 sysadm 1.14 {
879 sysadm 1.38 stdin_read_wait = 1;
880 sysadm 1.59 }
881    
882 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
883 sysadm 1.59 if (events[i].data.fd == sock)
884 sysadm 1.82 #else
885     if (pfds[i].fd == sock)
886     #endif
887 sysadm 1.59 {
888 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
889 sysadm 1.59 if (events[i].events & EPOLLIN)
890 sysadm 1.82 #else
891     if (pfds[i].revents & POLLIN)
892     #endif
893 sysadm 1.59 {
894     sock_read_wait = 1;
895     }
896 sysadm 1.82
897     #ifdef HAVE_SYS_EPOLL_H
898 sysadm 1.59 if (events[i].events & EPOLLOUT)
899 sysadm 1.82 #else
900     if (pfds[i].revents & POLLOUT)
901     #endif
902 sysadm 1.59 {
903     sock_write_wait = 1;
904     }
905     }
906    
907 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
908 sysadm 1.59 if (events[i].data.fd == STDOUT_FILENO)
909 sysadm 1.82 #else
910     if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
911 sysadm 1.84 #endif
912 sysadm 1.59 {
913     stdout_write_wait = 1;
914     }
915     }
916    
917     if (stdin_read_wait)
918     {
919     while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
920     {
921     if (SSH_v2)
922 sysadm 1.33 {
923 sysadm 1.59 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
924     if (ret == SSH_ERROR)
925 sysadm 1.47 {
926 sysadm 1.92 #ifdef _DEBUG
927 sysadm 1.59 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
928 sysadm 1.92 #endif
929 sysadm 1.59 loop = 0;
930     break;
931 sysadm 1.47 }
932 sysadm 1.59 else if (ret == SSH_EOF)
933 sysadm 1.47 {
934 sysadm 1.59 stdin_read_wait = 0;
935     loop = 0;
936     break;
937 sysadm 1.47 }
938 sysadm 1.59 else if (ret == 0)
939 sysadm 1.33 {
940 sysadm 1.72 // Send NO-OP to remote server
941     input_buf[input_buf_len] = '\0';
942     input_buf_len++;
943 sysadm 1.73 BBS_last_access_tm = time(NULL);
944 sysadm 1.72
945 sysadm 1.59 stdin_read_wait = 0;
946     break; // Check whether channel is still open
947 sysadm 1.38 }
948 sysadm 1.59 }
949     else
950     {
951     ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
952     }
953     if (ret < 0)
954     {
955     if (errno == EAGAIN || errno == EWOULDBLOCK)
956 sysadm 1.38 {
957     stdin_read_wait = 0;
958     break;
959     }
960 sysadm 1.59 else if (errno == EINTR)
961     {
962     continue;
963     }
964 sysadm 1.38 else
965     {
966 sysadm 1.59 log_error("read(STDIN) error (%d)\n", errno);
967     loop = 0;
968     break;
969     }
970     }
971     else if (ret == 0) // broken pipe
972     {
973     #ifdef _DEBUG
974     log_error("read(STDIN) EOF\n");
975     #endif
976     stdin_read_wait = 0;
977     loop = 0;
978     break;
979     }
980     else
981     {
982     input_buf_len += ret;
983     BBS_last_access_tm = time(NULL);
984 sysadm 1.58
985 sysadm 1.59 // Refresh current action while user input
986     if (user_online_update("BBS_NET") < 0)
987     {
988     log_error("user_online_update(BBS_NET) error\n");
989     }
990 sysadm 1.58
991 sysadm 1.59 continue;
992 sysadm 1.33 }
993 sysadm 1.36 }
994 sysadm 1.59 }
995 sysadm 1.29
996 sysadm 1.59 if (sock_write_wait)
997     {
998 sysadm 1.60 if (input_buf_offset < input_buf_len)
999 sysadm 1.36 {
1000 sysadm 1.72 // For debug
1001     #ifdef _DEBUG
1002     for (int j = input_buf_offset; j < input_buf_len; j++)
1003     {
1004     log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
1005     }
1006     #endif
1007    
1008 sysadm 1.66 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
1009 sysadm 1.60 if (ret < 0)
1010     {
1011 sysadm 1.66 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
1012 sysadm 1.71 input_buf_len = input_buf_offset; // Discard invalid sequence
1013 sysadm 1.60 }
1014 sysadm 1.72
1015     // For debug
1016     #ifdef _DEBUG
1017     for (int j = input_conv_offset; j < input_conv_len; j++)
1018     {
1019     log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
1020     }
1021     #endif
1022 sysadm 1.60 }
1023    
1024     while (input_conv_offset < input_conv_len && !SYS_server_exit)
1025     {
1026 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1027     {
1028     ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
1029     if (ret == SSH_ERROR)
1030     {
1031 sysadm 1.92 #ifdef _DEBUG
1032 sysadm 1.84 log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
1033 sysadm 1.92 #endif
1034 sysadm 1.84 loop = 0;
1035     break;
1036     }
1037     }
1038     else
1039     {
1040     ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
1041     }
1042 sysadm 1.59 if (ret < 0)
1043 sysadm 1.36 {
1044 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1045 sysadm 1.36 {
1046 sysadm 1.59 sock_write_wait = 0;
1047     break;
1048 sysadm 1.38 }
1049 sysadm 1.59 else if (errno == EINTR)
1050 sysadm 1.38 {
1051 sysadm 1.59 continue;
1052     }
1053     else
1054     {
1055 sysadm 1.92 #ifdef _DEBUG
1056 sysadm 1.59 log_error("write(socket) error (%d)\n", errno);
1057 sysadm 1.92 #endif
1058 sysadm 1.36 loop = 0;
1059 sysadm 1.38 break;
1060     }
1061 sysadm 1.59 }
1062     else if (ret == 0) // broken pipe
1063     {
1064     #ifdef _DEBUG
1065     log_error("write(socket) EOF\n");
1066     #endif
1067     sock_write_wait = 0;
1068     loop = 0;
1069     break;
1070     }
1071     else
1072     {
1073 sysadm 1.60 input_conv_offset += ret;
1074     if (input_conv_offset >= input_conv_len) // Output buffer complete
1075 sysadm 1.38 {
1076 sysadm 1.60 input_conv_offset = 0;
1077     input_conv_len = 0;
1078 sysadm 1.59 break;
1079 sysadm 1.36 }
1080 sysadm 1.59 continue;
1081 sysadm 1.36 }
1082 sysadm 1.14 }
1083 sysadm 1.59 }
1084 sysadm 1.36
1085 sysadm 1.59 if (sock_read_wait)
1086     {
1087     while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1088 sysadm 1.14 {
1089 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1090     {
1091     ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
1092     (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1093     if (ret == SSH_ERROR)
1094     {
1095 sysadm 1.92 #ifdef _DEBUG
1096 sysadm 1.84 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
1097 sysadm 1.92 #endif
1098 sysadm 1.84 loop = 0;
1099     break;
1100     }
1101     else if (ret == SSH_EOF)
1102     {
1103     sock_read_wait = 0;
1104     loop = 0;
1105     break;
1106     }
1107     else if (ret == 0)
1108     {
1109     sock_read_wait = 0;
1110     break;
1111     }
1112     }
1113     else
1114     {
1115     ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1116     }
1117 sysadm 1.59 if (ret < 0)
1118 sysadm 1.14 {
1119 sysadm 1.59 if (errno == EAGAIN || errno == EWOULDBLOCK)
1120 sysadm 1.38 {
1121 sysadm 1.59 sock_read_wait = 0;
1122     break;
1123 sysadm 1.38 }
1124 sysadm 1.59 else if (errno == EINTR)
1125 sysadm 1.33 {
1126 sysadm 1.59 continue;
1127 sysadm 1.38 }
1128     else
1129     {
1130 sysadm 1.92 #ifdef _DEBUG
1131 sysadm 1.59 log_error("read(socket) error (%d)\n", errno);
1132 sysadm 1.92 #endif
1133 sysadm 1.59 loop = 0;
1134     break;
1135 sysadm 1.33 }
1136     }
1137 sysadm 1.59 else if (ret == 0) // broken pipe
1138     {
1139     #ifdef _DEBUG
1140     log_error("read(socket) EOF\n");
1141     #endif
1142     sock_read_wait = 0;
1143     loop = 0;
1144     break;
1145     }
1146     else
1147     {
1148     output_buf_len += ret;
1149     continue;
1150     }
1151 sysadm 1.36 }
1152 sysadm 1.59 }
1153 sysadm 1.36
1154 sysadm 1.59 if (stdout_write_wait)
1155     {
1156 sysadm 1.60 if (output_buf_offset < output_buf_len)
1157     {
1158 sysadm 1.66 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1159 sysadm 1.60 if (ret < 0)
1160     {
1161 sysadm 1.66 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1162 sysadm 1.71 output_buf_len = output_buf_offset; // Discard invalid sequence
1163 sysadm 1.60 }
1164     }
1165    
1166     while (output_conv_offset < output_conv_len && !SYS_server_exit)
1167 sysadm 1.36 {
1168 sysadm 1.59 if (SSH_v2)
1169 sysadm 1.36 {
1170 sysadm 1.60 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1171 sysadm 1.59 if (ret == SSH_ERROR)
1172 sysadm 1.47 {
1173 sysadm 1.92 #ifdef _DEBUG
1174 sysadm 1.59 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1175 sysadm 1.92 #endif
1176 sysadm 1.59 loop = 0;
1177     break;
1178 sysadm 1.47 }
1179 sysadm 1.59 }
1180     else
1181     {
1182 sysadm 1.60 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1183 sysadm 1.59 }
1184     if (ret < 0)
1185     {
1186     if (errno == EAGAIN || errno == EWOULDBLOCK)
1187 sysadm 1.47 {
1188 sysadm 1.59 stdout_write_wait = 0;
1189     break;
1190 sysadm 1.47 }
1191 sysadm 1.59 else if (errno == EINTR)
1192 sysadm 1.38 {
1193 sysadm 1.59 continue;
1194 sysadm 1.38 }
1195 sysadm 1.59 else
1196 sysadm 1.33 {
1197 sysadm 1.92 #ifdef _DEBUG
1198 sysadm 1.59 log_error("write(STDOUT) error (%d)\n", errno);
1199 sysadm 1.92 #endif
1200 sysadm 1.36 loop = 0;
1201 sysadm 1.38 break;
1202     }
1203 sysadm 1.59 }
1204     else if (ret == 0) // broken pipe
1205     {
1206     #ifdef _DEBUG
1207     log_error("write(STDOUT) EOF\n");
1208     #endif
1209     stdout_write_wait = 0;
1210     loop = 0;
1211     break;
1212     }
1213     else
1214     {
1215 sysadm 1.60 output_conv_offset += ret;
1216     if (output_conv_offset >= output_conv_len) // Output buffer complete
1217 sysadm 1.38 {
1218 sysadm 1.60 output_conv_offset = 0;
1219     output_conv_len = 0;
1220 sysadm 1.59 break;
1221 sysadm 1.36 }
1222 sysadm 1.59 continue;
1223 sysadm 1.36 }
1224 sysadm 1.14 }
1225 sysadm 1.1 }
1226     }
1227    
1228 sysadm 1.89 cleanup:
1229     if (input_cd != (iconv_t)(-1))
1230     {
1231     iconv_close(input_cd);
1232     }
1233     if (output_cd != (iconv_t)(-1))
1234     {
1235     iconv_close(output_cd);
1236     }
1237 sysadm 1.60
1238 sysadm 1.82 #ifdef HAVE_SYS_EPOLL_H
1239 sysadm 1.89 if (epollfd != -1 && close(epollfd) < 0)
1240 sysadm 1.39 {
1241     log_error("close(epoll) error (%d)\n");
1242     }
1243 sysadm 1.82 #endif
1244 sysadm 1.39
1245 sysadm 1.84 if (bbsnet_conf[n].use_ssh)
1246     {
1247 sysadm 1.89 if (channel != NULL)
1248     {
1249     ssh_channel_free(channel);
1250     }
1251     if (session != NULL)
1252     {
1253     ssh_disconnect(session);
1254     ssh_free(session);
1255     }
1256 sysadm 1.84 }
1257    
1258 sysadm 1.36 // Restore STDIN/STDOUT flags
1259 sysadm 1.90 if (flags_stdin != -1 && fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1260 sysadm 1.89 {
1261     log_error("fcntl(F_SETFL) error (%d)\n", errno);
1262     }
1263     if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1264     {
1265     log_error("fcntl(F_SETFL) error (%d)\n", errno);
1266     }
1267 sysadm 1.36
1268 sysadm 1.89 if (sock != -1 && close(sock) == -1)
1269 sysadm 1.14 {
1270     log_error("Close socket failed\n");
1271     }
1272 sysadm 1.1
1273 sysadm 1.93 if (res)
1274     {
1275     freeaddrinfo(res);
1276     }
1277    
1278 sysadm 1.50 t_used = time(NULL) - t_used;
1279 sysadm 1.14 tm_used = gmtime(&t_used);
1280 sysadm 1.8
1281 sysadm 1.46 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1282 sysadm 1.90 tm_used->tm_yday, tm_used->tm_hour, tm_used->tm_min, tm_used->tm_sec);
1283 sysadm 1.8
1284 sysadm 1.72 BBS_last_access_tm = time(NULL);
1285    
1286 sysadm 1.14 return 0;
1287 sysadm 1.1 }
1288    
1289 sysadm 1.74 static int bbsnet_refresh()
1290 sysadm 1.1 {
1291 sysadm 1.14 clearscr();
1292 sysadm 1.84
1293     moveto(1, 1);
1294     prints(" ------------------------------------------------------------------------------ ");
1295 sysadm 1.20 for (int i = 2; i < 19; i++)
1296 sysadm 1.14 {
1297 sysadm 1.84 moveto(i, 1);
1298 sysadm 1.23 prints("|");
1299 sysadm 1.84 moveto(i, 80);
1300 sysadm 1.23 prints("|");
1301 sysadm 1.14 }
1302 sysadm 1.84 moveto(19, 1);
1303     prints("|------------------------------------------------------------------------------|");
1304     moveto(22, 1);
1305     prints(" ------------------------------------------------------------------------------ ");
1306     moveto(23, 1);
1307     prints(" [\033[1;32mCtrl+C\033[m]退出");
1308 sysadm 1.13
1309 sysadm 1.14 iflush();
1310 sysadm 1.1
1311 sysadm 1.14 return 0;
1312 sysadm 1.1 }
1313    
1314 sysadm 1.74 static int bbsnet_selchange()
1315 sysadm 1.1 {
1316 sysadm 1.43 int i = bbsnet_menu.menu_item_pos[0];
1317    
1318 sysadm 1.84 moveto(20, 1);
1319 sysadm 1.14 clrtoeol();
1320 sysadm 1.87 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1321     bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1322     bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1323     (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1324 sysadm 1.84 moveto(20, 80);
1325 sysadm 1.23 prints("|");
1326 sysadm 1.84 moveto(21, 1);
1327 sysadm 1.14 clrtoeol();
1328 sysadm 1.93 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5s\033[m 编码: \033[1;33m%s\033[m",
1329 sysadm 1.87 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1330 sysadm 1.84 moveto(21, 80);
1331 sysadm 1.23 prints("|");
1332 sysadm 1.14 iflush();
1333 sysadm 1.1
1334 sysadm 1.14 return 0;
1335 sysadm 1.1 }
1336    
1337 sysadm 1.83 int bbs_net()
1338 sysadm 1.1 {
1339 sysadm 1.43 int ch, i;
1340 sysadm 1.1
1341 sysadm 1.89 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1342     {
1343     clearscr();
1344     moveto(1, 1);
1345     prints("加载穿梭配置失败!");
1346     press_any_key();
1347     return -1;
1348     }
1349 sysadm 1.1
1350 sysadm 1.14 bbsnet_refresh();
1351 sysadm 1.41 display_menu(&bbsnet_menu);
1352 sysadm 1.43 bbsnet_selchange();
1353 sysadm 1.14
1354 sysadm 1.26 while (!SYS_server_exit)
1355 sysadm 1.1 {
1356 sysadm 1.39 ch = igetch(100);
1357 sysadm 1.52
1358 sysadm 1.71 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1359     {
1360     BBS_last_access_tm = time(NULL);
1361     }
1362 sysadm 1.64
1363 sysadm 1.14 switch (ch)
1364     {
1365 sysadm 1.47 case KEY_NULL: // broken pipe
1366 sysadm 1.91 #ifdef _DEBUG
1367 sysadm 1.64 log_error("KEY_NULL\n");
1368 sysadm 1.91 #endif
1369 sysadm 1.40 goto cleanup;
1370 sysadm 1.14 case KEY_TIMEOUT:
1371 sysadm 1.78 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1372 sysadm 1.14 {
1373 sysadm 1.64 log_error("User input timeout\n");
1374 sysadm 1.40 goto cleanup;
1375 sysadm 1.14 }
1376 sysadm 1.29 continue;
1377 sysadm 1.64 case KEY_ESC:
1378     case Ctrl('C'): // user cancel
1379     goto cleanup;
1380 sysadm 1.14 case CR:
1381 sysadm 1.43 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1382 sysadm 1.84 // Force cleanup anything remaining in the output buffer
1383     clearscr();
1384     iflush();
1385     // Clear screen and redraw menu
1386 sysadm 1.14 bbsnet_refresh();
1387 sysadm 1.41 display_menu(&bbsnet_menu);
1388 sysadm 1.43 bbsnet_selchange();
1389 sysadm 1.14 break;
1390     case KEY_UP:
1391     for (i = 0; i < STATION_PER_LINE; i++)
1392 sysadm 1.20 {
1393 sysadm 1.14 menu_control(&bbsnet_menu, KEY_UP);
1394 sysadm 1.20 }
1395 sysadm 1.43 bbsnet_selchange();
1396 sysadm 1.14 break;
1397     case KEY_DOWN:
1398     for (i = 0; i < STATION_PER_LINE; i++)
1399 sysadm 1.20 {
1400 sysadm 1.14 menu_control(&bbsnet_menu, KEY_DOWN);
1401 sysadm 1.20 }
1402 sysadm 1.43 bbsnet_selchange();
1403 sysadm 1.14 break;
1404     case KEY_LEFT:
1405     menu_control(&bbsnet_menu, KEY_UP);
1406 sysadm 1.43 bbsnet_selchange();
1407 sysadm 1.14 break;
1408     case KEY_RIGHT:
1409     menu_control(&bbsnet_menu, KEY_DOWN);
1410 sysadm 1.43 bbsnet_selchange();
1411     break;
1412 sysadm 1.44 case KEY_HOME:
1413 sysadm 1.43 case KEY_PGUP:
1414     menu_control(&bbsnet_menu, KEY_PGUP);
1415     bbsnet_selchange();
1416 sysadm 1.14 break;
1417 sysadm 1.44 case KEY_END:
1418     case KEY_PGDN:
1419     menu_control(&bbsnet_menu, KEY_PGDN);
1420     bbsnet_selchange();
1421     break;
1422 sysadm 1.14 default:
1423     menu_control(&bbsnet_menu, ch);
1424 sysadm 1.43 bbsnet_selchange();
1425 sysadm 1.14 break;
1426     }
1427 sysadm 1.1 }
1428    
1429 sysadm 1.40 cleanup:
1430     unload_bbsnet_conf();
1431    
1432 sysadm 1.14 return 0;
1433 sysadm 1.1 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1