| 16 |
|
|
| 17 |
#include "bbs.h" |
#include "bbs.h" |
| 18 |
#include "common.h" |
#include "common.h" |
|
#include "log.h" |
|
| 19 |
#include "io.h" |
#include "io.h" |
| 20 |
#include "screen.h" |
#include "log.h" |
| 21 |
|
#include "login.h" |
| 22 |
#include "menu.h" |
#include "menu.h" |
| 23 |
#include <stdio.h> |
#include "screen.h" |
|
#include <stdarg.h> |
|
| 24 |
#include <errno.h> |
#include <errno.h> |
|
#include <string.h> |
|
|
#include <stdlib.h> |
|
| 25 |
#include <fcntl.h> |
#include <fcntl.h> |
| 26 |
|
#include <netdb.h> |
| 27 |
|
#include <stdarg.h> |
| 28 |
|
#include <stdio.h> |
| 29 |
|
#include <stdlib.h> |
| 30 |
|
#include <string.h> |
| 31 |
#include <time.h> |
#include <time.h> |
| 32 |
#include <unistd.h> |
#include <unistd.h> |
| 33 |
#include <netdb.h> |
#include <arpa/inet.h> |
| 34 |
|
#include <libssh/libssh.h> |
| 35 |
|
#include <libssh/server.h> |
| 36 |
|
#include <libssh/callbacks.h> |
| 37 |
|
#include <netinet/in.h> |
| 38 |
|
#include <netinet/ip.h> |
| 39 |
#include <sys/select.h> |
#include <sys/select.h> |
| 40 |
#include <sys/ioctl.h> |
#include <sys/ioctl.h> |
| 41 |
#include <sys/socket.h> |
#include <sys/socket.h> |
| 42 |
#include <sys/epoll.h> |
#include <sys/epoll.h> |
|
#include <netinet/in.h> |
|
|
#include <netinet/ip.h> |
|
|
#include <arpa/inet.h> |
|
| 43 |
|
|
| 44 |
#define MENU_CONF_DELIM " \t\r\n" |
#define MENU_CONF_DELIM " \t\r\n" |
| 45 |
|
|
| 213 |
int tos; |
int tos; |
| 214 |
char remote_addr[IP_ADDR_LEN]; |
char remote_addr[IP_ADDR_LEN]; |
| 215 |
int remote_port; |
int remote_port; |
| 216 |
time_t t_used; |
time_t t_used = time(NULL); |
| 217 |
struct tm *tm_used; |
struct tm *tm_used; |
| 218 |
int ch; |
int ch; |
| 219 |
|
|
| 220 |
|
if (user_online_update("BBS_NET") < 0) |
| 221 |
|
{ |
| 222 |
|
log_error("user_online_update(BBS_NET) error\n"); |
| 223 |
|
} |
| 224 |
|
|
| 225 |
clearscr(); |
clearscr(); |
| 226 |
|
|
| 227 |
moveto(0, 0); |
moveto(0, 0); |
| 248 |
} |
} |
| 249 |
|
|
| 250 |
sin.sin_family = AF_INET; |
sin.sin_family = AF_INET; |
| 251 |
sin.sin_addr.s_addr = (hostaddr_server[0] != '\0' ? inet_addr(hostaddr_server) : INADDR_ANY); |
sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY); |
| 252 |
sin.sin_port = 0; |
sin.sin_port = 0; |
| 253 |
|
|
| 254 |
if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) |
if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) |
| 258 |
return -2; |
return -2; |
| 259 |
} |
} |
| 260 |
|
|
| 261 |
bzero(&sin, sizeof(sin)); |
memset(&sin, 0, sizeof(sin)); |
| 262 |
sin.sin_family = AF_INET; |
sin.sin_family = AF_INET; |
| 263 |
sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0]; |
sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0]; |
| 264 |
sin.sin_port = htons(bbsnet_conf[n].port); |
sin.sin_port = htons(bbsnet_conf[n].port); |
| 412 |
goto cleanup; |
goto cleanup; |
| 413 |
} |
} |
| 414 |
|
|
| 415 |
BBS_last_access_tm = t_used = time(0); |
BBS_last_access_tm = t_used = time(NULL); |
| 416 |
loop = 1; |
loop = 1; |
| 417 |
|
|
| 418 |
while (loop && !SYS_server_exit) |
while (loop && !SYS_server_exit) |
| 419 |
{ |
{ |
| 420 |
|
if (SSH_v2 && ssh_channel_is_closed(SSH_channel)) |
| 421 |
|
{ |
| 422 |
|
log_error("SSH channel is closed\n"); |
| 423 |
|
loop = 0; |
| 424 |
|
break; |
| 425 |
|
} |
| 426 |
|
|
| 427 |
nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second |
nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second |
| 428 |
|
|
| 429 |
if (nfds < 0) |
if (nfds < 0) |
| 437 |
} |
} |
| 438 |
else if (nfds == 0) // timeout |
else if (nfds == 0) // timeout |
| 439 |
{ |
{ |
| 440 |
if (time(0) - BBS_last_access_tm >= MAX_DELAY_TIME) |
if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME) |
| 441 |
{ |
{ |
| 442 |
break; |
break; |
| 443 |
} |
} |
| 451 |
stdin_read_wait = 1; |
stdin_read_wait = 1; |
| 452 |
while (input_buf_len < sizeof(input_buf) && !SYS_server_exit) |
while (input_buf_len < sizeof(input_buf) && !SYS_server_exit) |
| 453 |
{ |
{ |
| 454 |
ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len); |
if (SSH_v2) |
| 455 |
|
{ |
| 456 |
|
ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0); |
| 457 |
|
if (ret == SSH_ERROR) |
| 458 |
|
{ |
| 459 |
|
log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session)); |
| 460 |
|
loop = 0; |
| 461 |
|
break; |
| 462 |
|
} |
| 463 |
|
else if (ret == SSH_EOF) |
| 464 |
|
{ |
| 465 |
|
stdin_read_wait = 0; |
| 466 |
|
loop = 0; |
| 467 |
|
break; |
| 468 |
|
} |
| 469 |
|
else if (ret == 0) |
| 470 |
|
{ |
| 471 |
|
stdin_read_wait = 0; |
| 472 |
|
break; // Check whether channel is still open |
| 473 |
|
} |
| 474 |
|
} |
| 475 |
|
else |
| 476 |
|
{ |
| 477 |
|
ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len); |
| 478 |
|
} |
| 479 |
if (ret < 0) |
if (ret < 0) |
| 480 |
{ |
{ |
| 481 |
if (errno == EAGAIN || errno == EWOULDBLOCK) |
if (errno == EAGAIN || errno == EWOULDBLOCK) |
| 496 |
} |
} |
| 497 |
else if (ret == 0) // broken pipe |
else if (ret == 0) // broken pipe |
| 498 |
{ |
{ |
| 499 |
log_common("read(STDIN) EOF\n"); |
#ifdef _DEBUG |
| 500 |
|
log_error("read(STDIN) EOF\n"); |
| 501 |
|
#endif |
| 502 |
stdin_read_wait = 0; |
stdin_read_wait = 0; |
| 503 |
loop = 0; |
loop = 0; |
| 504 |
break; |
break; |
| 506 |
else |
else |
| 507 |
{ |
{ |
| 508 |
input_buf_len += ret; |
input_buf_len += ret; |
| 509 |
BBS_last_access_tm = time(0); |
BBS_last_access_tm = time(NULL); |
| 510 |
continue; |
continue; |
| 511 |
} |
} |
| 512 |
} |
} |
| 538 |
} |
} |
| 539 |
else if (ret == 0) // broken pipe |
else if (ret == 0) // broken pipe |
| 540 |
{ |
{ |
| 541 |
log_common("write(socket) EOF\n"); |
#ifdef _DEBUG |
| 542 |
|
log_error("write(socket) EOF\n"); |
| 543 |
|
#endif |
| 544 |
sock_write_wait = 0; |
sock_write_wait = 0; |
| 545 |
loop = 0; |
loop = 0; |
| 546 |
break; |
break; |
| 585 |
} |
} |
| 586 |
else if (ret == 0) // broken pipe |
else if (ret == 0) // broken pipe |
| 587 |
{ |
{ |
| 588 |
log_common("read(socket) EOF\n"); |
#ifdef _DEBUG |
| 589 |
|
log_error("read(socket) EOF\n"); |
| 590 |
|
#endif |
| 591 |
sock_read_wait = 0; |
sock_read_wait = 0; |
| 592 |
loop = 0; |
loop = 0; |
| 593 |
break; |
break; |
| 605 |
stdout_write_wait = 1; |
stdout_write_wait = 1; |
| 606 |
while (output_buf_offset < output_buf_len && !SYS_server_exit) |
while (output_buf_offset < output_buf_len && !SYS_server_exit) |
| 607 |
{ |
{ |
| 608 |
ret = (int)write(STDOUT_FILENO, output_buf + output_buf_offset, (size_t)(output_buf_len - output_buf_offset)); |
if (SSH_v2) |
| 609 |
|
{ |
| 610 |
|
ret = ssh_channel_write(SSH_channel, output_buf + output_buf_offset, (uint32_t)(output_buf_len - output_buf_offset)); |
| 611 |
|
if (ret == SSH_ERROR) |
| 612 |
|
{ |
| 613 |
|
log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session)); |
| 614 |
|
loop = 0; |
| 615 |
|
break; |
| 616 |
|
} |
| 617 |
|
} |
| 618 |
|
else |
| 619 |
|
{ |
| 620 |
|
ret = (int)write(STDOUT_FILENO, output_buf + output_buf_offset, (size_t)(output_buf_len - output_buf_offset)); |
| 621 |
|
} |
| 622 |
if (ret < 0) |
if (ret < 0) |
| 623 |
{ |
{ |
| 624 |
if (errno == EAGAIN || errno == EWOULDBLOCK) |
if (errno == EAGAIN || errno == EWOULDBLOCK) |
| 639 |
} |
} |
| 640 |
else if (ret == 0) // broken pipe |
else if (ret == 0) // broken pipe |
| 641 |
{ |
{ |
| 642 |
log_common("write(STDOUT) EOF\n"); |
#ifdef _DEBUG |
| 643 |
|
log_error("write(STDOUT) EOF\n"); |
| 644 |
|
#endif |
| 645 |
stdout_write_wait = 0; |
stdout_write_wait = 0; |
| 646 |
loop = 0; |
loop = 0; |
| 647 |
break; |
break; |
| 680 |
log_error("Close socket failed\n"); |
log_error("Close socket failed\n"); |
| 681 |
} |
} |
| 682 |
|
|
| 683 |
t_used = time(0) - t_used; |
t_used = time(NULL) - t_used; |
| 684 |
tm_used = gmtime(&t_used); |
tm_used = gmtime(&t_used); |
| 685 |
|
|
| 686 |
log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n", |
log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n", |
| 687 |
tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min, |
tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min, |
| 688 |
tm_used->tm_sec); |
tm_used->tm_sec); |
| 689 |
|
|
| 690 |
return 0; |
return 0; |
| 691 |
} |
} |
| 746 |
|
|
| 747 |
load_bbsnet_conf(CONF_BBSNET); |
load_bbsnet_conf(CONF_BBSNET); |
| 748 |
|
|
| 749 |
BBS_last_access_tm = time(0); |
BBS_last_access_tm = time(NULL); |
| 750 |
|
|
| 751 |
clearscr(); |
clearscr(); |
| 752 |
bbsnet_refresh(); |
bbsnet_refresh(); |
| 756 |
while (!SYS_server_exit) |
while (!SYS_server_exit) |
| 757 |
{ |
{ |
| 758 |
ch = igetch(100); |
ch = igetch(100); |
| 759 |
|
|
| 760 |
switch (ch) |
switch (ch) |
| 761 |
{ |
{ |
| 762 |
case KEY_NULL: // broken pipe |
case KEY_NULL: // broken pipe |
| 763 |
case KEY_ESC: |
case KEY_ESC: |
| 764 |
case Ctrl('C'): // user cancel |
case Ctrl('C'): // user cancel |
| 765 |
goto cleanup; |
goto cleanup; |
| 766 |
case KEY_TIMEOUT: |
case KEY_TIMEOUT: |
| 767 |
if (time(0) - BBS_last_access_tm >= MAX_DELAY_TIME) |
if (time(NULL) - BBS_last_access_tm >= MAX_DELAY_TIME) |
| 768 |
{ |
{ |
| 769 |
goto cleanup; |
goto cleanup; |
| 770 |
} |
} |
| 813 |
bbsnet_selchange(); |
bbsnet_selchange(); |
| 814 |
break; |
break; |
| 815 |
} |
} |
| 816 |
BBS_last_access_tm = time(0); |
BBS_last_access_tm = time(NULL); |
| 817 |
} |
} |
| 818 |
|
|
| 819 |
cleanup: |
cleanup: |