/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Contents of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.82 - (show annotations)
Mon Nov 17 06:41:18 2025 UTC (3 months, 4 weeks ago) by sysadm
Branch: MAIN
Changes since 1.81: +82 -8 lines
Content type: text/x-csrc
Add --with-epoll to configure to switch between epoll and poll

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * bbs_net
4 * - user interactive feature of site shuttle
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 #ifdef HAVE_CONFIG_H
10 #include "config.h"
11 #endif
12
13 #include "bbs.h"
14 #include "common.h"
15 #include "io.h"
16 #include "log.h"
17 #include "login.h"
18 #include "menu.h"
19 #include "screen.h"
20 #include <errno.h>
21 #include <fcntl.h>
22 #include <netdb.h>
23 #include <stdarg.h>
24 #include <stdio.h>
25 #include <stdlib.h>
26 #include <string.h>
27 #include <time.h>
28 #include <unistd.h>
29 #include <arpa/inet.h>
30 #include <libssh/libssh.h>
31 #include <libssh/server.h>
32 #include <libssh/callbacks.h>
33 #include <netinet/in.h>
34 #include <netinet/ip.h>
35 #include <sys/select.h>
36 #include <sys/ioctl.h>
37 #include <sys/socket.h>
38
39 #ifdef HAVE_SYS_EPOLL_H
40 #include <sys/epoll.h>
41 #else
42 #include <poll.h>
43 #endif
44
45 static const char MENU_CONF_DELIM[] = " \t\r\n";
46
47 enum _bbs_net_constant_t
48 {
49 MAX_PROCESS_BAR_LEN = 30,
50 MAXSTATION = 26 * 2,
51 STATION_PER_LINE = 4,
52 };
53
54 struct _bbsnet_conf
55 {
56 char host1[20];
57 char host2[40];
58 char ip[40];
59 in_port_t port;
60 char charset[CHARSET_MAX_LEN + 1];
61 } bbsnet_conf[MAXSTATION];
62
63 static MENU_SET bbsnet_menu;
64
65 static int load_bbsnet_conf(const char *file_config)
66 {
67 FILE *fp;
68 MENU *p_menu;
69 MENU_ITEM *p_menu_item;
70 MENU_ITEM_ID menu_item_id;
71 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
72
73 fp = fopen(file_config, "r");
74 if (fp == NULL)
75 {
76 return -1;
77 }
78
79 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
80 if (bbsnet_menu.p_menu_pool == NULL)
81 {
82 log_error("calloc(p_menu_pool) error\n");
83 return -3;
84 }
85 bbsnet_menu.menu_count = 1;
86
87 bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
88 if (bbsnet_menu.p_menu_item_pool == NULL)
89 {
90 log_error("calloc(p_menu_item_pool) error\n");
91 return -3;
92 }
93 bbsnet_menu.menu_item_count = MAXSTATION;
94
95 p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
96
97 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
98 p_menu->name[sizeof(p_menu->name) - 1] = '\0';
99 p_menu->title.show = 0;
100 p_menu->screen_show = 0;
101
102 menu_item_id = 0;
103 while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
104 {
105 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
106 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
107 t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
108 t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
109 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
110
111 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
112 {
113 continue;
114 }
115
116 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
117 bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
118 strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
119 bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
120 strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
121 bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
122 bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
123 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
124 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
125
126 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
127 if (p_menu_item == NULL)
128 {
129 log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
130 return -1;
131 }
132
133 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
134 p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
135 snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
136 p_menu_item->submenu = 0;
137 p_menu_item->priv = 0;
138 p_menu_item->level = 0;
139 p_menu_item->name[0] =
140 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
141 p_menu_item->name[1] = '\0';
142 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
143 p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
144
145 p_menu->items[p_menu->item_count] = menu_item_id;
146 p_menu->item_count++;
147 menu_item_id++;
148 }
149
150 bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
151 bbsnet_menu.menu_id_path[0] = 0;
152 bbsnet_menu.menu_item_pos[0] = 0;
153 bbsnet_menu.choose_step = 0;
154
155 fclose(fp);
156
157 return 0;
158 }
159
160 static void unload_bbsnet_conf(void)
161 {
162 bbsnet_menu.menu_count = 0;
163 bbsnet_menu.menu_item_count = 0;
164
165 free(bbsnet_menu.p_menu_pool);
166 bbsnet_menu.p_menu_pool = NULL;
167 free(bbsnet_menu.p_menu_item_pool);
168 bbsnet_menu.p_menu_item_pool = NULL;
169 }
170
171 static void process_bar(int n, int len)
172 {
173 char buf[LINE_BUFFER_LEN];
174 char buf2[LINE_BUFFER_LEN];
175
176 if (len > LINE_BUFFER_LEN)
177 {
178 len = LINE_BUFFER_LEN - 1;
179 }
180 if (n < 0)
181 {
182 n = 0;
183 }
184 else if (n > len)
185 {
186 n = len;
187 }
188
189 moveto(4, 0);
190 prints(" ------------------------------ \r\n");
191 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
192 memcpy(buf2, buf, (size_t)n);
193 buf2[n] = '\0';
194 prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
195 prints(" ------------------------------ \r\n");
196 iflush();
197 }
198
199 static int bbsnet_connect(int n)
200 {
201 int sock, ret, loop, error;
202 int sock_connected = 0;
203 int flags_sock;
204 int flags_stdin;
205 int flags_stdout;
206 int len;
207 struct sockaddr_in sin;
208 char input_buf[LINE_BUFFER_LEN];
209 char output_buf[LINE_BUFFER_LEN];
210 int input_buf_len = 0;
211 int output_buf_len = 0;
212 int input_buf_offset = 0;
213 int output_buf_offset = 0;
214 char input_conv[LINE_BUFFER_LEN * 2];
215 char output_conv[LINE_BUFFER_LEN * 2];
216 int input_conv_len = 0;
217 int output_conv_len = 0;
218 int input_conv_offset = 0;
219 int output_conv_offset = 0;
220 iconv_t input_cd = NULL;
221 iconv_t output_cd = NULL;
222 char tocode[32];
223
224 #ifdef HAVE_SYS_EPOLL_H
225 struct epoll_event ev, events[MAX_EVENTS];
226 int epollfd;
227 #else
228 struct pollfd pfds[3];
229 #endif
230
231 int nfds;
232 int stdin_read_wait = 0;
233 int stdout_write_wait = 0;
234 int sock_read_wait = 0;
235 int sock_write_wait = 0;
236 struct hostent *p_host = NULL;
237 int tos;
238 char remote_addr[IP_ADDR_LEN];
239 int remote_port;
240 char local_addr[IP_ADDR_LEN];
241 int local_port;
242 socklen_t sock_len;
243 time_t t_used = time(NULL);
244 struct tm *tm_used;
245 int ch;
246
247 if (user_online_update("BBS_NET") < 0)
248 {
249 log_error("user_online_update(BBS_NET) error\n");
250 }
251
252 clearscr();
253
254 moveto(0, 0);
255 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
256 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
257 iflush();
258
259 p_host = gethostbyname(bbsnet_conf[n].ip);
260
261 if (p_host == NULL)
262 {
263 prints("\033[1;31m查找主机名失败!\033[m\r\n");
264 press_any_key();
265 return -1;
266 }
267
268 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
269
270 if (sock < 0)
271 {
272 prints("\033[1;31m无法创建socket!\033[m\r\n");
273 press_any_key();
274 return -1;
275 }
276
277 sin.sin_family = AF_INET;
278 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
279 sin.sin_port = 0;
280
281 if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
282 {
283 log_error("Bind address %s:%u failed (%d)\n",
284 inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
285 return -2;
286 }
287
288 memset(&sin, 0, sizeof(sin));
289 sin.sin_family = AF_INET;
290 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
291 sin.sin_port = htons(bbsnet_conf[n].port);
292
293 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
294 remote_addr[sizeof(remote_addr) - 1] = '\0';
295 remote_port = ntohs(sin.sin_port);
296
297 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
298 process_bar(0, MAX_PROCESS_BAR_LEN);
299
300 // Set socket as non-blocking
301 flags_sock = fcntl(sock, F_GETFL, 0);
302 fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
303
304 // Set STDIN/STDOUT as non-blocking
305 flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
306 flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
307 fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
308 fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
309
310 #ifdef HAVE_SYS_EPOLL_H
311 epollfd = epoll_create1(0);
312 if (epollfd < 0)
313 {
314 log_error("epoll_create1() error (%d)\n", errno);
315 return -1;
316 }
317
318 ev.events = EPOLLOUT | EPOLLET;
319 ev.data.fd = sock;
320 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
321 {
322 log_error("epoll_ctl(socket) error (%d)\n", errno);
323 goto cleanup;
324 }
325
326 ev.events = EPOLLIN | EPOLLET;
327 ev.data.fd = STDIN_FILENO;
328 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
329 {
330 log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
331 goto cleanup;
332 }
333 #endif
334
335 while (!SYS_server_exit)
336 {
337 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
338 {
339 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
340 {
341 // Use select / epoll to check writability of the socket,
342 // then use getsockopt to check the status of the socket.
343 // See man connect(2)
344 break;
345 }
346 else if (errno == EINTR)
347 {
348 continue;
349 }
350 else
351 {
352 log_error("connect(socket) error (%d)\n", errno);
353
354 prints("\033[1;31m连接失败!\033[m\r\n");
355 press_any_key();
356
357 goto cleanup;
358 }
359 }
360 }
361
362 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
363 {
364 #ifdef HAVE_SYS_EPOLL_H
365 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
366 ret = nfds;
367 #else
368 pfds[0].fd = sock;
369 pfds[0].events = POLLOUT;
370 pfds[1].fd = STDIN_FILENO;
371 pfds[1].events = POLLIN;
372 nfds = 2;
373 ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
374 #endif
375
376 if (ret < 0)
377 {
378 if (errno != EINTR)
379 {
380 #ifdef HAVE_SYS_EPOLL_H
381 log_error("epoll_wait() error (%d)\n", errno);
382 #else
383 log_error("poll() error (%d)\n", errno);
384 #endif
385 break;
386 }
387 }
388 else if (ret == 0) // timeout
389 {
390 process_bar(j + 1, MAX_PROCESS_BAR_LEN);
391 }
392 else // ret > 0
393 {
394 for (int i = 0; i < nfds; i++)
395 {
396 #ifdef HAVE_SYS_EPOLL_H
397 if (events[i].data.fd == sock)
398 #else
399 if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
400 #endif
401 {
402 len = sizeof(error);
403 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
404 {
405 log_error("getsockopt() error (%d) !\n", error);
406 goto cleanup;
407 }
408 if (error == 0)
409 {
410 sock_connected = 1;
411 }
412 }
413 #ifdef HAVE_SYS_EPOLL_H
414 else if (events[i].data.fd == STDIN_FILENO)
415 #else
416 else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
417 #endif
418 {
419 ch = igetch(0);
420 if (ch == Ctrl('C') || ch == KEY_ESC)
421 {
422 goto cleanup;
423 }
424 }
425 }
426 }
427 }
428 if (SYS_server_exit)
429 {
430 goto cleanup;
431 }
432 if (!sock_connected)
433 {
434 prints("\033[1;31m连接失败!\033[m\r\n");
435 press_any_key();
436
437 goto cleanup;
438 }
439
440 tos = IPTOS_LOWDELAY;
441 if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
442 {
443 log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
444 }
445
446 sock_len = sizeof(sin);
447 if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
448 {
449 log_error("getsockname() error: %d", errno);
450 goto cleanup;
451 }
452
453 strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
454 local_addr[sizeof(local_addr) - 1] = '\0';
455 local_port = ntohs(sin.sin_port);
456
457 prints("\033[1;31m连接成功!\033[m\r\n");
458 iflush();
459 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
460 remote_addr, remote_port, local_addr, local_port, BBS_username);
461
462 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
463 (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
464 input_cd = iconv_open(tocode, stdio_charset);
465 if (input_cd == (iconv_t)(-1))
466 {
467 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
468 goto cleanup;
469 }
470
471 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
472 (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
473 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
474 if (output_cd == (iconv_t)(-1))
475 {
476 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
477 iconv_close(input_cd);
478 goto cleanup;
479 }
480
481 #ifdef HAVE_SYS_EPOLL_H
482 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
483 ev.data.fd = sock;
484 if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
485 {
486 log_error("epoll_ctl(socket) error (%d)\n", errno);
487 goto cleanup;
488 }
489
490 ev.events = EPOLLOUT | EPOLLET;
491 ev.data.fd = STDOUT_FILENO;
492 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
493 {
494 log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
495 goto cleanup;
496 }
497 #endif
498
499 BBS_last_access_tm = t_used = time(NULL);
500 loop = 1;
501
502 while (loop && !SYS_server_exit)
503 {
504 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
505 {
506 log_error("SSH channel is closed\n");
507 loop = 0;
508 break;
509 }
510
511 #ifdef HAVE_SYS_EPOLL_H
512 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
513 ret = nfds;
514 #else
515 pfds[0].fd = STDIN_FILENO;
516 pfds[0].events = POLLIN;
517 pfds[1].fd = sock;
518 pfds[1].events = POLLIN | POLLOUT;
519 pfds[2].fd = STDOUT_FILENO;
520 pfds[2].events = POLLOUT;
521 nfds = 3;
522 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
523 #endif
524
525 if (ret < 0)
526 {
527 if (errno != EINTR)
528 {
529 #ifdef HAVE_SYS_EPOLL_H
530 log_error("epoll_wait() error (%d)\n", errno);
531 #else
532 log_error("poll() error (%d)\n", errno);
533 #endif
534 break;
535 }
536 continue;
537 }
538 else if (ret == 0) // timeout
539 {
540 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
541 {
542 break;
543 }
544 }
545
546 for (int i = 0; i < nfds; i++)
547 {
548 #ifdef HAVE_SYS_EPOLL_H
549 if (events[i].data.fd == STDIN_FILENO)
550 #else
551 if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
552 #endif
553 {
554 stdin_read_wait = 1;
555 }
556
557 #ifdef HAVE_SYS_EPOLL_H
558 if (events[i].data.fd == sock)
559 #else
560 if (pfds[i].fd == sock)
561 #endif
562 {
563 #ifdef HAVE_SYS_EPOLL_H
564 if (events[i].events & EPOLLIN)
565 #else
566 if (pfds[i].revents & POLLIN)
567 #endif
568 {
569 sock_read_wait = 1;
570 }
571
572 #ifdef HAVE_SYS_EPOLL_H
573 if (events[i].events & EPOLLOUT)
574 #else
575 if (pfds[i].revents & POLLOUT)
576 #endif
577 {
578 sock_write_wait = 1;
579 }
580 }
581
582 #ifdef HAVE_SYS_EPOLL_H
583 if (events[i].data.fd == STDOUT_FILENO)
584 #else
585 if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
586 #endif
587 {
588 stdout_write_wait = 1;
589 }
590 }
591
592 if (stdin_read_wait)
593 {
594 while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
595 {
596 if (SSH_v2)
597 {
598 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
599 if (ret == SSH_ERROR)
600 {
601 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
602 loop = 0;
603 break;
604 }
605 else if (ret == SSH_EOF)
606 {
607 stdin_read_wait = 0;
608 loop = 0;
609 break;
610 }
611 else if (ret == 0)
612 {
613 // Send NO-OP to remote server
614 input_buf[input_buf_len] = '\0';
615 input_buf_len++;
616 BBS_last_access_tm = time(NULL);
617
618 stdin_read_wait = 0;
619 break; // Check whether channel is still open
620 }
621 }
622 else
623 {
624 ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
625 }
626 if (ret < 0)
627 {
628 if (errno == EAGAIN || errno == EWOULDBLOCK)
629 {
630 stdin_read_wait = 0;
631 break;
632 }
633 else if (errno == EINTR)
634 {
635 continue;
636 }
637 else
638 {
639 log_error("read(STDIN) error (%d)\n", errno);
640 loop = 0;
641 break;
642 }
643 }
644 else if (ret == 0) // broken pipe
645 {
646 #ifdef _DEBUG
647 log_error("read(STDIN) EOF\n");
648 #endif
649 stdin_read_wait = 0;
650 loop = 0;
651 break;
652 }
653 else
654 {
655 input_buf_len += ret;
656 BBS_last_access_tm = time(NULL);
657
658 // Refresh current action while user input
659 if (user_online_update("BBS_NET") < 0)
660 {
661 log_error("user_online_update(BBS_NET) error\n");
662 }
663
664 continue;
665 }
666 }
667 }
668
669 if (sock_write_wait)
670 {
671 if (input_buf_offset < input_buf_len)
672 {
673 // For debug
674 #ifdef _DEBUG
675 for (int j = input_buf_offset; j < input_buf_len; j++)
676 {
677 log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
678 }
679 #endif
680
681 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
682 if (ret < 0)
683 {
684 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
685 input_buf_len = input_buf_offset; // Discard invalid sequence
686 }
687
688 // For debug
689 #ifdef _DEBUG
690 for (int j = input_conv_offset; j < input_conv_len; j++)
691 {
692 log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
693 }
694 #endif
695 }
696
697 while (input_conv_offset < input_conv_len && !SYS_server_exit)
698 {
699 ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
700 if (ret < 0)
701 {
702 if (errno == EAGAIN || errno == EWOULDBLOCK)
703 {
704 sock_write_wait = 0;
705 break;
706 }
707 else if (errno == EINTR)
708 {
709 continue;
710 }
711 else
712 {
713 log_error("write(socket) error (%d)\n", errno);
714 loop = 0;
715 break;
716 }
717 }
718 else if (ret == 0) // broken pipe
719 {
720 #ifdef _DEBUG
721 log_error("write(socket) EOF\n");
722 #endif
723 sock_write_wait = 0;
724 loop = 0;
725 break;
726 }
727 else
728 {
729 input_conv_offset += ret;
730 if (input_conv_offset >= input_conv_len) // Output buffer complete
731 {
732 input_conv_offset = 0;
733 input_conv_len = 0;
734 break;
735 }
736 continue;
737 }
738 }
739 }
740
741 if (sock_read_wait)
742 {
743 while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
744 {
745 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
746 if (ret < 0)
747 {
748 if (errno == EAGAIN || errno == EWOULDBLOCK)
749 {
750 sock_read_wait = 0;
751 break;
752 }
753 else if (errno == EINTR)
754 {
755 continue;
756 }
757 else
758 {
759 log_error("read(socket) error (%d)\n", errno);
760 loop = 0;
761 break;
762 }
763 }
764 else if (ret == 0) // broken pipe
765 {
766 #ifdef _DEBUG
767 log_error("read(socket) EOF\n");
768 #endif
769 sock_read_wait = 0;
770 loop = 0;
771 break;
772 }
773 else
774 {
775 output_buf_len += ret;
776 continue;
777 }
778 }
779 }
780
781 if (stdout_write_wait)
782 {
783 if (output_buf_offset < output_buf_len)
784 {
785 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
786 if (ret < 0)
787 {
788 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
789 output_buf_len = output_buf_offset; // Discard invalid sequence
790 }
791 }
792
793 while (output_conv_offset < output_conv_len && !SYS_server_exit)
794 {
795 if (SSH_v2)
796 {
797 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
798 if (ret == SSH_ERROR)
799 {
800 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
801 loop = 0;
802 break;
803 }
804 }
805 else
806 {
807 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
808 }
809 if (ret < 0)
810 {
811 if (errno == EAGAIN || errno == EWOULDBLOCK)
812 {
813 stdout_write_wait = 0;
814 break;
815 }
816 else if (errno == EINTR)
817 {
818 continue;
819 }
820 else
821 {
822 log_error("write(STDOUT) error (%d)\n", errno);
823 loop = 0;
824 break;
825 }
826 }
827 else if (ret == 0) // broken pipe
828 {
829 #ifdef _DEBUG
830 log_error("write(STDOUT) EOF\n");
831 #endif
832 stdout_write_wait = 0;
833 loop = 0;
834 break;
835 }
836 else
837 {
838 output_conv_offset += ret;
839 if (output_conv_offset >= output_conv_len) // Output buffer complete
840 {
841 output_conv_offset = 0;
842 output_conv_len = 0;
843 break;
844 }
845 continue;
846 }
847 }
848 }
849 }
850
851 iconv_close(input_cd);
852 iconv_close(output_cd);
853
854 cleanup:
855 #ifdef HAVE_SYS_EPOLL_H
856 if (close(epollfd) < 0)
857 {
858 log_error("close(epoll) error (%d)\n");
859 }
860 #endif
861
862 // Restore STDIN/STDOUT flags
863 fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
864 fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
865
866 if (close(sock) == -1)
867 {
868 log_error("Close socket failed\n");
869 }
870
871 t_used = time(NULL) - t_used;
872 tm_used = gmtime(&t_used);
873
874 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
875 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
876 tm_used->tm_sec);
877
878 BBS_last_access_tm = time(NULL);
879
880 return 0;
881 }
882
883 static int bbsnet_refresh()
884 {
885 clearscr();
886 moveto(1, 0);
887 prints(" ----------------------------------------------------------------------------- ");
888 for (int i = 2; i < 19; i++)
889 {
890 moveto(i, 0);
891 prints("|");
892 moveto(i, 79);
893 prints("|");
894 }
895 moveto(19, 0);
896 prints("|-----------------------------------------------------------------------------|");
897 moveto(22, 0);
898 prints(" ----------------------------------------------------------------------------- ");
899 moveto(23, 0);
900 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
901
902 iflush();
903
904 return 0;
905 }
906
907 static int bbsnet_selchange()
908 {
909 int i = bbsnet_menu.menu_item_pos[0];
910
911 moveto(20, 0);
912 clrtoeol();
913 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
914 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
915 moveto(20, 79);
916 prints("|");
917 moveto(21, 0);
918 clrtoeol();
919 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
920 if (bbsnet_conf[i].port != 23)
921 {
922 prints(" %d", bbsnet_conf[i].port);
923 }
924 prints("\x1b[m");
925 moveto(21, 79);
926 prints("|");
927 iflush();
928
929 return 0;
930 }
931
932 extern int bbs_net()
933 {
934 int ch, i;
935
936 load_bbsnet_conf(CONF_BBSNET);
937
938 clearscr();
939 bbsnet_refresh();
940 display_menu(&bbsnet_menu);
941 bbsnet_selchange();
942
943 while (!SYS_server_exit)
944 {
945 ch = igetch(100);
946
947 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
948 {
949 BBS_last_access_tm = time(NULL);
950 }
951
952 switch (ch)
953 {
954 case KEY_NULL: // broken pipe
955 log_error("KEY_NULL\n");
956 goto cleanup;
957 case KEY_TIMEOUT:
958 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
959 {
960 log_error("User input timeout\n");
961 goto cleanup;
962 }
963 continue;
964 case KEY_ESC:
965 case Ctrl('C'): // user cancel
966 goto cleanup;
967 case CR:
968 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
969 bbsnet_refresh();
970 display_menu(&bbsnet_menu);
971 bbsnet_selchange();
972 break;
973 case KEY_UP:
974 for (i = 0; i < STATION_PER_LINE; i++)
975 {
976 menu_control(&bbsnet_menu, KEY_UP);
977 }
978 bbsnet_selchange();
979 break;
980 case KEY_DOWN:
981 for (i = 0; i < STATION_PER_LINE; i++)
982 {
983 menu_control(&bbsnet_menu, KEY_DOWN);
984 }
985 bbsnet_selchange();
986 break;
987 case KEY_LEFT:
988 menu_control(&bbsnet_menu, KEY_UP);
989 bbsnet_selchange();
990 break;
991 case KEY_RIGHT:
992 menu_control(&bbsnet_menu, KEY_DOWN);
993 bbsnet_selchange();
994 break;
995 case KEY_HOME:
996 case KEY_PGUP:
997 menu_control(&bbsnet_menu, KEY_PGUP);
998 bbsnet_selchange();
999 break;
1000 case KEY_END:
1001 case KEY_PGDN:
1002 menu_control(&bbsnet_menu, KEY_PGDN);
1003 bbsnet_selchange();
1004 break;
1005 default:
1006 menu_control(&bbsnet_menu, ch);
1007 bbsnet_selchange();
1008 break;
1009 }
1010 }
1011
1012 cleanup:
1013 unload_bbsnet_conf();
1014
1015 return 0;
1016 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1