/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Contents of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.83 - (show annotations)
Fri Nov 21 07:36:41 2025 UTC (3 months, 3 weeks ago) by sysadm
Branch: MAIN
Changes since 1.82: +2 -1 lines
Content type: text/x-csrc
Use static library for bbs_net and game/chicken while --without-sysv is applied to ./configure

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * bbs_net
4 * - user interactive feature of site shuttle
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 #ifdef HAVE_CONFIG_H
10 #include "config.h"
11 #endif
12
13 #include "bbs.h"
14 #include "bbs_net.h"
15 #include "common.h"
16 #include "io.h"
17 #include "log.h"
18 #include "login.h"
19 #include "menu.h"
20 #include "screen.h"
21 #include <errno.h>
22 #include <fcntl.h>
23 #include <netdb.h>
24 #include <stdarg.h>
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <time.h>
29 #include <unistd.h>
30 #include <arpa/inet.h>
31 #include <libssh/libssh.h>
32 #include <libssh/server.h>
33 #include <libssh/callbacks.h>
34 #include <netinet/in.h>
35 #include <netinet/ip.h>
36 #include <sys/select.h>
37 #include <sys/ioctl.h>
38 #include <sys/socket.h>
39
40 #ifdef HAVE_SYS_EPOLL_H
41 #include <sys/epoll.h>
42 #else
43 #include <poll.h>
44 #endif
45
46 static const char MENU_CONF_DELIM[] = " \t\r\n";
47
48 enum _bbs_net_constant_t
49 {
50 MAX_PROCESS_BAR_LEN = 30,
51 MAXSTATION = 26 * 2,
52 STATION_PER_LINE = 4,
53 };
54
55 struct _bbsnet_conf
56 {
57 char host1[20];
58 char host2[40];
59 char ip[40];
60 in_port_t port;
61 char charset[CHARSET_MAX_LEN + 1];
62 } bbsnet_conf[MAXSTATION];
63
64 static MENU_SET bbsnet_menu;
65
66 static int load_bbsnet_conf(const char *file_config)
67 {
68 FILE *fp;
69 MENU *p_menu;
70 MENU_ITEM *p_menu_item;
71 MENU_ITEM_ID menu_item_id;
72 char t[256], *t1, *t2, *t3, *t4, *t5, *saveptr;
73
74 fp = fopen(file_config, "r");
75 if (fp == NULL)
76 {
77 return -1;
78 }
79
80 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
81 if (bbsnet_menu.p_menu_pool == NULL)
82 {
83 log_error("calloc(p_menu_pool) error\n");
84 return -3;
85 }
86 bbsnet_menu.menu_count = 1;
87
88 bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
89 if (bbsnet_menu.p_menu_item_pool == NULL)
90 {
91 log_error("calloc(p_menu_item_pool) error\n");
92 return -3;
93 }
94 bbsnet_menu.menu_item_count = MAXSTATION;
95
96 p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
97
98 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
99 p_menu->name[sizeof(p_menu->name) - 1] = '\0';
100 p_menu->title.show = 0;
101 p_menu->screen_show = 0;
102
103 menu_item_id = 0;
104 while (fgets(t, 255, fp) && menu_item_id < MAXSTATION)
105 {
106 t1 = strtok_r(t, MENU_CONF_DELIM, &saveptr);
107 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
108 t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
109 t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
110 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
111
112 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t[0] == '#' || t[0] == '*')
113 {
114 continue;
115 }
116
117 strncpy(bbsnet_conf[menu_item_id].host1, t2, sizeof(bbsnet_conf[menu_item_id].host1) - 1);
118 bbsnet_conf[menu_item_id].host1[sizeof(bbsnet_conf[menu_item_id].host1) - 1] = '\0';
119 strncpy(bbsnet_conf[menu_item_id].host2, t1, sizeof(bbsnet_conf[menu_item_id].host2) - 1);
120 bbsnet_conf[menu_item_id].host2[sizeof(bbsnet_conf[menu_item_id].host2) - 1] = '\0';
121 strncpy(bbsnet_conf[menu_item_id].ip, t3, sizeof(bbsnet_conf[menu_item_id].ip) - 1);
122 bbsnet_conf[menu_item_id].ip[sizeof(bbsnet_conf[menu_item_id].ip) - 1] = '\0';
123 bbsnet_conf[menu_item_id].port = (in_port_t)(t4 ? atoi(t4) : 23);
124 strncpy(bbsnet_conf[menu_item_id].charset, t5, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
125 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
126
127 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
128 if (p_menu_item == NULL)
129 {
130 log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
131 return -1;
132 }
133
134 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
135 p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
136 snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
137 p_menu_item->submenu = 0;
138 p_menu_item->priv = 0;
139 p_menu_item->level = 0;
140 p_menu_item->name[0] =
141 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
142 p_menu_item->name[1] = '\0';
143 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "%c. %s",
144 p_menu_item->name[0], bbsnet_conf[menu_item_id].host1);
145
146 p_menu->items[p_menu->item_count] = menu_item_id;
147 p_menu->item_count++;
148 menu_item_id++;
149 }
150
151 bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
152 bbsnet_menu.menu_id_path[0] = 0;
153 bbsnet_menu.menu_item_pos[0] = 0;
154 bbsnet_menu.choose_step = 0;
155
156 fclose(fp);
157
158 return 0;
159 }
160
161 static void unload_bbsnet_conf(void)
162 {
163 bbsnet_menu.menu_count = 0;
164 bbsnet_menu.menu_item_count = 0;
165
166 free(bbsnet_menu.p_menu_pool);
167 bbsnet_menu.p_menu_pool = NULL;
168 free(bbsnet_menu.p_menu_item_pool);
169 bbsnet_menu.p_menu_item_pool = NULL;
170 }
171
172 static void process_bar(int n, int len)
173 {
174 char buf[LINE_BUFFER_LEN];
175 char buf2[LINE_BUFFER_LEN];
176
177 if (len > LINE_BUFFER_LEN)
178 {
179 len = LINE_BUFFER_LEN - 1;
180 }
181 if (n < 0)
182 {
183 n = 0;
184 }
185 else if (n > len)
186 {
187 n = len;
188 }
189
190 moveto(4, 0);
191 prints(" ------------------------------ \r\n");
192 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
193 memcpy(buf2, buf, (size_t)n);
194 buf2[n] = '\0';
195 prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
196 prints(" ------------------------------ \r\n");
197 iflush();
198 }
199
200 static int bbsnet_connect(int n)
201 {
202 int sock, ret, loop, error;
203 int sock_connected = 0;
204 int flags_sock;
205 int flags_stdin;
206 int flags_stdout;
207 int len;
208 struct sockaddr_in sin;
209 char input_buf[LINE_BUFFER_LEN];
210 char output_buf[LINE_BUFFER_LEN];
211 int input_buf_len = 0;
212 int output_buf_len = 0;
213 int input_buf_offset = 0;
214 int output_buf_offset = 0;
215 char input_conv[LINE_BUFFER_LEN * 2];
216 char output_conv[LINE_BUFFER_LEN * 2];
217 int input_conv_len = 0;
218 int output_conv_len = 0;
219 int input_conv_offset = 0;
220 int output_conv_offset = 0;
221 iconv_t input_cd = NULL;
222 iconv_t output_cd = NULL;
223 char tocode[32];
224
225 #ifdef HAVE_SYS_EPOLL_H
226 struct epoll_event ev, events[MAX_EVENTS];
227 int epollfd;
228 #else
229 struct pollfd pfds[3];
230 #endif
231
232 int nfds;
233 int stdin_read_wait = 0;
234 int stdout_write_wait = 0;
235 int sock_read_wait = 0;
236 int sock_write_wait = 0;
237 struct hostent *p_host = NULL;
238 int tos;
239 char remote_addr[IP_ADDR_LEN];
240 int remote_port;
241 char local_addr[IP_ADDR_LEN];
242 int local_port;
243 socklen_t sock_len;
244 time_t t_used = time(NULL);
245 struct tm *tm_used;
246 int ch;
247
248 if (user_online_update("BBS_NET") < 0)
249 {
250 log_error("user_online_update(BBS_NET) error\n");
251 }
252
253 clearscr();
254
255 moveto(0, 0);
256 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
257 bbsnet_conf[n].host1, bbsnet_conf[n].ip);
258 iflush();
259
260 p_host = gethostbyname(bbsnet_conf[n].ip);
261
262 if (p_host == NULL)
263 {
264 prints("\033[1;31m查找主机名失败!\033[m\r\n");
265 press_any_key();
266 return -1;
267 }
268
269 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
270
271 if (sock < 0)
272 {
273 prints("\033[1;31m无法创建socket!\033[m\r\n");
274 press_any_key();
275 return -1;
276 }
277
278 sin.sin_family = AF_INET;
279 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
280 sin.sin_port = 0;
281
282 if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
283 {
284 log_error("Bind address %s:%u failed (%d)\n",
285 inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
286 return -2;
287 }
288
289 memset(&sin, 0, sizeof(sin));
290 sin.sin_family = AF_INET;
291 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
292 sin.sin_port = htons(bbsnet_conf[n].port);
293
294 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
295 remote_addr[sizeof(remote_addr) - 1] = '\0';
296 remote_port = ntohs(sin.sin_port);
297
298 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
299 process_bar(0, MAX_PROCESS_BAR_LEN);
300
301 // Set socket as non-blocking
302 flags_sock = fcntl(sock, F_GETFL, 0);
303 fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK);
304
305 // Set STDIN/STDOUT as non-blocking
306 flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0);
307 flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0);
308 fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK);
309 fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK);
310
311 #ifdef HAVE_SYS_EPOLL_H
312 epollfd = epoll_create1(0);
313 if (epollfd < 0)
314 {
315 log_error("epoll_create1() error (%d)\n", errno);
316 return -1;
317 }
318
319 ev.events = EPOLLOUT | EPOLLET;
320 ev.data.fd = sock;
321 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
322 {
323 log_error("epoll_ctl(socket) error (%d)\n", errno);
324 goto cleanup;
325 }
326
327 ev.events = EPOLLIN | EPOLLET;
328 ev.data.fd = STDIN_FILENO;
329 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
330 {
331 log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
332 goto cleanup;
333 }
334 #endif
335
336 while (!SYS_server_exit)
337 {
338 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
339 {
340 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
341 {
342 // Use select / epoll to check writability of the socket,
343 // then use getsockopt to check the status of the socket.
344 // See man connect(2)
345 break;
346 }
347 else if (errno == EINTR)
348 {
349 continue;
350 }
351 else
352 {
353 log_error("connect(socket) error (%d)\n", errno);
354
355 prints("\033[1;31m连接失败!\033[m\r\n");
356 press_any_key();
357
358 goto cleanup;
359 }
360 }
361 }
362
363 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
364 {
365 #ifdef HAVE_SYS_EPOLL_H
366 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
367 ret = nfds;
368 #else
369 pfds[0].fd = sock;
370 pfds[0].events = POLLOUT;
371 pfds[1].fd = STDIN_FILENO;
372 pfds[1].events = POLLIN;
373 nfds = 2;
374 ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
375 #endif
376
377 if (ret < 0)
378 {
379 if (errno != EINTR)
380 {
381 #ifdef HAVE_SYS_EPOLL_H
382 log_error("epoll_wait() error (%d)\n", errno);
383 #else
384 log_error("poll() error (%d)\n", errno);
385 #endif
386 break;
387 }
388 }
389 else if (ret == 0) // timeout
390 {
391 process_bar(j + 1, MAX_PROCESS_BAR_LEN);
392 }
393 else // ret > 0
394 {
395 for (int i = 0; i < nfds; i++)
396 {
397 #ifdef HAVE_SYS_EPOLL_H
398 if (events[i].data.fd == sock)
399 #else
400 if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
401 #endif
402 {
403 len = sizeof(error);
404 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, (socklen_t *)&len) < 0)
405 {
406 log_error("getsockopt() error (%d) !\n", error);
407 goto cleanup;
408 }
409 if (error == 0)
410 {
411 sock_connected = 1;
412 }
413 }
414 #ifdef HAVE_SYS_EPOLL_H
415 else if (events[i].data.fd == STDIN_FILENO)
416 #else
417 else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
418 #endif
419 {
420 ch = igetch(0);
421 if (ch == Ctrl('C') || ch == KEY_ESC)
422 {
423 goto cleanup;
424 }
425 }
426 }
427 }
428 }
429 if (SYS_server_exit)
430 {
431 goto cleanup;
432 }
433 if (!sock_connected)
434 {
435 prints("\033[1;31m连接失败!\033[m\r\n");
436 press_any_key();
437
438 goto cleanup;
439 }
440
441 tos = IPTOS_LOWDELAY;
442 if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
443 {
444 log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
445 }
446
447 sock_len = sizeof(sin);
448 if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
449 {
450 log_error("getsockname() error: %d", errno);
451 goto cleanup;
452 }
453
454 strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
455 local_addr[sizeof(local_addr) - 1] = '\0';
456 local_port = ntohs(sin.sin_port);
457
458 prints("\033[1;31m连接成功!\033[m\r\n");
459 iflush();
460 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
461 remote_addr, remote_port, local_addr, local_port, BBS_username);
462
463 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
464 (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
465 input_cd = iconv_open(tocode, stdio_charset);
466 if (input_cd == (iconv_t)(-1))
467 {
468 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
469 goto cleanup;
470 }
471
472 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
473 (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
474 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
475 if (output_cd == (iconv_t)(-1))
476 {
477 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
478 iconv_close(input_cd);
479 goto cleanup;
480 }
481
482 #ifdef HAVE_SYS_EPOLL_H
483 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
484 ev.data.fd = sock;
485 if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
486 {
487 log_error("epoll_ctl(socket) error (%d)\n", errno);
488 goto cleanup;
489 }
490
491 ev.events = EPOLLOUT | EPOLLET;
492 ev.data.fd = STDOUT_FILENO;
493 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
494 {
495 log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
496 goto cleanup;
497 }
498 #endif
499
500 BBS_last_access_tm = t_used = time(NULL);
501 loop = 1;
502
503 while (loop && !SYS_server_exit)
504 {
505 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
506 {
507 log_error("SSH channel is closed\n");
508 loop = 0;
509 break;
510 }
511
512 #ifdef HAVE_SYS_EPOLL_H
513 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
514 ret = nfds;
515 #else
516 pfds[0].fd = STDIN_FILENO;
517 pfds[0].events = POLLIN;
518 pfds[1].fd = sock;
519 pfds[1].events = POLLIN | POLLOUT;
520 pfds[2].fd = STDOUT_FILENO;
521 pfds[2].events = POLLOUT;
522 nfds = 3;
523 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
524 #endif
525
526 if (ret < 0)
527 {
528 if (errno != EINTR)
529 {
530 #ifdef HAVE_SYS_EPOLL_H
531 log_error("epoll_wait() error (%d)\n", errno);
532 #else
533 log_error("poll() error (%d)\n", errno);
534 #endif
535 break;
536 }
537 continue;
538 }
539 else if (ret == 0) // timeout
540 {
541 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
542 {
543 break;
544 }
545 }
546
547 for (int i = 0; i < nfds; i++)
548 {
549 #ifdef HAVE_SYS_EPOLL_H
550 if (events[i].data.fd == STDIN_FILENO)
551 #else
552 if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
553 #endif
554 {
555 stdin_read_wait = 1;
556 }
557
558 #ifdef HAVE_SYS_EPOLL_H
559 if (events[i].data.fd == sock)
560 #else
561 if (pfds[i].fd == sock)
562 #endif
563 {
564 #ifdef HAVE_SYS_EPOLL_H
565 if (events[i].events & EPOLLIN)
566 #else
567 if (pfds[i].revents & POLLIN)
568 #endif
569 {
570 sock_read_wait = 1;
571 }
572
573 #ifdef HAVE_SYS_EPOLL_H
574 if (events[i].events & EPOLLOUT)
575 #else
576 if (pfds[i].revents & POLLOUT)
577 #endif
578 {
579 sock_write_wait = 1;
580 }
581 }
582
583 #ifdef HAVE_SYS_EPOLL_H
584 if (events[i].data.fd == STDOUT_FILENO)
585 #else
586 if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
587 #endif
588 {
589 stdout_write_wait = 1;
590 }
591 }
592
593 if (stdin_read_wait)
594 {
595 while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
596 {
597 if (SSH_v2)
598 {
599 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
600 if (ret == SSH_ERROR)
601 {
602 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
603 loop = 0;
604 break;
605 }
606 else if (ret == SSH_EOF)
607 {
608 stdin_read_wait = 0;
609 loop = 0;
610 break;
611 }
612 else if (ret == 0)
613 {
614 // Send NO-OP to remote server
615 input_buf[input_buf_len] = '\0';
616 input_buf_len++;
617 BBS_last_access_tm = time(NULL);
618
619 stdin_read_wait = 0;
620 break; // Check whether channel is still open
621 }
622 }
623 else
624 {
625 ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
626 }
627 if (ret < 0)
628 {
629 if (errno == EAGAIN || errno == EWOULDBLOCK)
630 {
631 stdin_read_wait = 0;
632 break;
633 }
634 else if (errno == EINTR)
635 {
636 continue;
637 }
638 else
639 {
640 log_error("read(STDIN) error (%d)\n", errno);
641 loop = 0;
642 break;
643 }
644 }
645 else if (ret == 0) // broken pipe
646 {
647 #ifdef _DEBUG
648 log_error("read(STDIN) EOF\n");
649 #endif
650 stdin_read_wait = 0;
651 loop = 0;
652 break;
653 }
654 else
655 {
656 input_buf_len += ret;
657 BBS_last_access_tm = time(NULL);
658
659 // Refresh current action while user input
660 if (user_online_update("BBS_NET") < 0)
661 {
662 log_error("user_online_update(BBS_NET) error\n");
663 }
664
665 continue;
666 }
667 }
668 }
669
670 if (sock_write_wait)
671 {
672 if (input_buf_offset < input_buf_len)
673 {
674 // For debug
675 #ifdef _DEBUG
676 for (int j = input_buf_offset; j < input_buf_len; j++)
677 {
678 log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
679 }
680 #endif
681
682 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
683 if (ret < 0)
684 {
685 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
686 input_buf_len = input_buf_offset; // Discard invalid sequence
687 }
688
689 // For debug
690 #ifdef _DEBUG
691 for (int j = input_conv_offset; j < input_conv_len; j++)
692 {
693 log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
694 }
695 #endif
696 }
697
698 while (input_conv_offset < input_conv_len && !SYS_server_exit)
699 {
700 ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
701 if (ret < 0)
702 {
703 if (errno == EAGAIN || errno == EWOULDBLOCK)
704 {
705 sock_write_wait = 0;
706 break;
707 }
708 else if (errno == EINTR)
709 {
710 continue;
711 }
712 else
713 {
714 log_error("write(socket) error (%d)\n", errno);
715 loop = 0;
716 break;
717 }
718 }
719 else if (ret == 0) // broken pipe
720 {
721 #ifdef _DEBUG
722 log_error("write(socket) EOF\n");
723 #endif
724 sock_write_wait = 0;
725 loop = 0;
726 break;
727 }
728 else
729 {
730 input_conv_offset += ret;
731 if (input_conv_offset >= input_conv_len) // Output buffer complete
732 {
733 input_conv_offset = 0;
734 input_conv_len = 0;
735 break;
736 }
737 continue;
738 }
739 }
740 }
741
742 if (sock_read_wait)
743 {
744 while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
745 {
746 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
747 if (ret < 0)
748 {
749 if (errno == EAGAIN || errno == EWOULDBLOCK)
750 {
751 sock_read_wait = 0;
752 break;
753 }
754 else if (errno == EINTR)
755 {
756 continue;
757 }
758 else
759 {
760 log_error("read(socket) error (%d)\n", errno);
761 loop = 0;
762 break;
763 }
764 }
765 else if (ret == 0) // broken pipe
766 {
767 #ifdef _DEBUG
768 log_error("read(socket) EOF\n");
769 #endif
770 sock_read_wait = 0;
771 loop = 0;
772 break;
773 }
774 else
775 {
776 output_buf_len += ret;
777 continue;
778 }
779 }
780 }
781
782 if (stdout_write_wait)
783 {
784 if (output_buf_offset < output_buf_len)
785 {
786 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
787 if (ret < 0)
788 {
789 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
790 output_buf_len = output_buf_offset; // Discard invalid sequence
791 }
792 }
793
794 while (output_conv_offset < output_conv_len && !SYS_server_exit)
795 {
796 if (SSH_v2)
797 {
798 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
799 if (ret == SSH_ERROR)
800 {
801 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
802 loop = 0;
803 break;
804 }
805 }
806 else
807 {
808 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
809 }
810 if (ret < 0)
811 {
812 if (errno == EAGAIN || errno == EWOULDBLOCK)
813 {
814 stdout_write_wait = 0;
815 break;
816 }
817 else if (errno == EINTR)
818 {
819 continue;
820 }
821 else
822 {
823 log_error("write(STDOUT) error (%d)\n", errno);
824 loop = 0;
825 break;
826 }
827 }
828 else if (ret == 0) // broken pipe
829 {
830 #ifdef _DEBUG
831 log_error("write(STDOUT) EOF\n");
832 #endif
833 stdout_write_wait = 0;
834 loop = 0;
835 break;
836 }
837 else
838 {
839 output_conv_offset += ret;
840 if (output_conv_offset >= output_conv_len) // Output buffer complete
841 {
842 output_conv_offset = 0;
843 output_conv_len = 0;
844 break;
845 }
846 continue;
847 }
848 }
849 }
850 }
851
852 iconv_close(input_cd);
853 iconv_close(output_cd);
854
855 cleanup:
856 #ifdef HAVE_SYS_EPOLL_H
857 if (close(epollfd) < 0)
858 {
859 log_error("close(epoll) error (%d)\n");
860 }
861 #endif
862
863 // Restore STDIN/STDOUT flags
864 fcntl(STDIN_FILENO, F_SETFL, flags_stdin);
865 fcntl(STDOUT_FILENO, F_SETFL, flags_stdout);
866
867 if (close(sock) == -1)
868 {
869 log_error("Close socket failed\n");
870 }
871
872 t_used = time(NULL) - t_used;
873 tm_used = gmtime(&t_used);
874
875 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
876 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
877 tm_used->tm_sec);
878
879 BBS_last_access_tm = time(NULL);
880
881 return 0;
882 }
883
884 static int bbsnet_refresh()
885 {
886 clearscr();
887 moveto(1, 0);
888 prints(" ----------------------------------------------------------------------------- ");
889 for (int i = 2; i < 19; i++)
890 {
891 moveto(i, 0);
892 prints("|");
893 moveto(i, 79);
894 prints("|");
895 }
896 moveto(19, 0);
897 prints("|-----------------------------------------------------------------------------|");
898 moveto(22, 0);
899 prints(" ----------------------------------------------------------------------------- ");
900 moveto(23, 0);
901 prints(" [\x1b[1;32mCtrl+C\x1b[m]退出");
902
903 iflush();
904
905 return 0;
906 }
907
908 static int bbsnet_selchange()
909 {
910 int i = bbsnet_menu.menu_item_pos[0];
911
912 moveto(20, 0);
913 clrtoeol();
914 prints("|\x1b[1m单位:\x1b[1;33m%-18s\x1b[m 站名:\x1b[1;33m%s\x1b[m",
915 bbsnet_conf[i].host2, bbsnet_conf[i].host1);
916 moveto(20, 79);
917 prints("|");
918 moveto(21, 0);
919 clrtoeol();
920 prints("|\x1b[1m连往:\x1b[1;33m%-20s", bbsnet_conf[i].ip);
921 if (bbsnet_conf[i].port != 23)
922 {
923 prints(" %d", bbsnet_conf[i].port);
924 }
925 prints("\x1b[m");
926 moveto(21, 79);
927 prints("|");
928 iflush();
929
930 return 0;
931 }
932
933 int bbs_net()
934 {
935 int ch, i;
936
937 load_bbsnet_conf(CONF_BBSNET);
938
939 clearscr();
940 bbsnet_refresh();
941 display_menu(&bbsnet_menu);
942 bbsnet_selchange();
943
944 while (!SYS_server_exit)
945 {
946 ch = igetch(100);
947
948 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
949 {
950 BBS_last_access_tm = time(NULL);
951 }
952
953 switch (ch)
954 {
955 case KEY_NULL: // broken pipe
956 log_error("KEY_NULL\n");
957 goto cleanup;
958 case KEY_TIMEOUT:
959 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
960 {
961 log_error("User input timeout\n");
962 goto cleanup;
963 }
964 continue;
965 case KEY_ESC:
966 case Ctrl('C'): // user cancel
967 goto cleanup;
968 case CR:
969 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
970 bbsnet_refresh();
971 display_menu(&bbsnet_menu);
972 bbsnet_selchange();
973 break;
974 case KEY_UP:
975 for (i = 0; i < STATION_PER_LINE; i++)
976 {
977 menu_control(&bbsnet_menu, KEY_UP);
978 }
979 bbsnet_selchange();
980 break;
981 case KEY_DOWN:
982 for (i = 0; i < STATION_PER_LINE; i++)
983 {
984 menu_control(&bbsnet_menu, KEY_DOWN);
985 }
986 bbsnet_selchange();
987 break;
988 case KEY_LEFT:
989 menu_control(&bbsnet_menu, KEY_UP);
990 bbsnet_selchange();
991 break;
992 case KEY_RIGHT:
993 menu_control(&bbsnet_menu, KEY_DOWN);
994 bbsnet_selchange();
995 break;
996 case KEY_HOME:
997 case KEY_PGUP:
998 menu_control(&bbsnet_menu, KEY_PGUP);
999 bbsnet_selchange();
1000 break;
1001 case KEY_END:
1002 case KEY_PGDN:
1003 menu_control(&bbsnet_menu, KEY_PGDN);
1004 bbsnet_selchange();
1005 break;
1006 default:
1007 menu_control(&bbsnet_menu, ch);
1008 bbsnet_selchange();
1009 break;
1010 }
1011 }
1012
1013 cleanup:
1014 unload_bbsnet_conf();
1015
1016 return 0;
1017 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1