/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Contents of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.89 - (show annotations)
Tue Dec 16 12:59:14 2025 UTC (3 months ago) by sysadm
Branch: MAIN
Changes since 1.88: +143 -50 lines
Content type: text/x-csrc
Refine cleanup code for errors
Add error handling of fcntl()

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * bbs_net
4 * - user interactive feature of site shuttle
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 #ifdef HAVE_CONFIG_H
10 #include "config.h"
11 #endif
12
13 #include "bbs.h"
14 #include "bbs_net.h"
15 #include "common.h"
16 #include "io.h"
17 #include "log.h"
18 #include "login.h"
19 #include "menu.h"
20 #include "screen.h"
21 #include "str_process.h"
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <netdb.h>
25 #include <stdarg.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <time.h>
30 #include <unistd.h>
31 #include <arpa/inet.h>
32 #include <ctype.h>
33 #include <libssh/libssh.h>
34 #include <libssh/server.h>
35 #include <libssh/callbacks.h>
36 #include <netinet/in.h>
37 #include <netinet/ip.h>
38 #include <sys/select.h>
39 #include <sys/ioctl.h>
40 #include <sys/socket.h>
41
42 #ifdef HAVE_SYS_EPOLL_H
43 #include <sys/epoll.h>
44 #else
45 #include <poll.h>
46 #endif
47
48 static const char MENU_CONF_DELIM[] = " \t\r\n";
49
50 enum _bbs_net_constant_t
51 {
52 MAX_PROCESS_BAR_LEN = 30,
53 MAXSTATION = 26 * 2,
54 STATION_PER_LINE = 4,
55 USERNAME_MAX_LEN = 20,
56 PASSWORD_MAX_LEN = 20,
57 };
58
59 struct _bbsnet_conf
60 {
61 char org_name[40];
62 char site_name[40];
63 char host_name[IP_ADDR_LEN];
64 in_port_t port;
65 int8_t use_ssh;
66 char charset[CHARSET_MAX_LEN + 1];
67 } bbsnet_conf[MAXSTATION];
68
69 static MENU_SET bbsnet_menu;
70
71 static void unload_bbsnet_conf(void);
72
73 static int load_bbsnet_conf(const char *file_config)
74 {
75 FILE *fp;
76 MENU *p_menu;
77 MENU_ITEM *p_menu_item;
78 MENU_ITEM_ID menu_item_id;
79 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
80 int port;
81
82 unload_bbsnet_conf();
83
84 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
85 if (bbsnet_menu.p_menu_pool == NULL)
86 {
87 log_error("calloc(p_menu_pool) error\n");
88 return -1;
89 }
90 bbsnet_menu.menu_count = 1;
91
92 bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
93 if (bbsnet_menu.p_menu_item_pool == NULL)
94 {
95 log_error("calloc(p_menu_item_pool) error\n");
96 unload_bbsnet_conf();
97 return -1;
98 }
99 bbsnet_menu.menu_item_count = MAXSTATION;
100
101 p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
102
103 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
104 p_menu->name[sizeof(p_menu->name) - 1] = '\0';
105 p_menu->title.show = 0;
106 p_menu->screen_show = 0;
107
108 fp = fopen(file_config, "r");
109 if (fp == NULL)
110 {
111 unload_bbsnet_conf();
112 return -2;
113 }
114
115 menu_item_id = 0;
116 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
117 {
118 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
119 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
120 t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
121 t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
122 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124
125 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
126 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
127 {
128 continue;
129 }
130
131 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
132 bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
133 strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
134 bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
135 strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
136 bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
137 port = atoi(t4);
138 if (port <= 0 || port > 65535)
139 {
140 log_error("Invalid port value %d of menu item %d\n", port, menu_item_id);
141 fclose(fp);
142 unload_bbsnet_conf();
143 return -3;
144 }
145 bbsnet_conf[menu_item_id].port = (in_port_t)port;
146 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
147 strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
148 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
149
150 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
151 if (p_menu_item == NULL)
152 {
153 log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
154 fclose(fp);
155 unload_bbsnet_conf();
156 return -3;
157 }
158
159 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
160 p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
161 snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
162 p_menu_item->submenu = 0;
163 p_menu_item->priv = 0;
164 p_menu_item->level = 0;
165 p_menu_item->name[0] =
166 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
167 p_menu_item->name[1] = '\0';
168 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
169 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
170
171 p_menu->items[p_menu->item_count] = menu_item_id;
172 p_menu->item_count++;
173 menu_item_id++;
174 }
175
176 bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
177 bbsnet_menu.menu_id_path[0] = 0;
178 bbsnet_menu.menu_item_pos[0] = 0;
179 bbsnet_menu.choose_step = 0;
180
181 fclose(fp);
182
183 return 0;
184 }
185
186 static void unload_bbsnet_conf(void)
187 {
188 bbsnet_menu.menu_count = 0;
189 bbsnet_menu.menu_item_count = 0;
190
191 if (bbsnet_menu.p_menu_pool)
192 {
193 free(bbsnet_menu.p_menu_pool);
194 bbsnet_menu.p_menu_pool = NULL;
195 }
196
197 if (bbsnet_menu.p_menu_item_pool)
198 {
199 free(bbsnet_menu.p_menu_item_pool);
200 bbsnet_menu.p_menu_item_pool = NULL;
201 }
202 }
203
204 static void process_bar(int n, int len)
205 {
206 char buf[LINE_BUFFER_LEN];
207 char buf2[LINE_BUFFER_LEN];
208
209 if (len <= 0)
210 {
211 len = 1;
212 }
213 else if (len > LINE_BUFFER_LEN)
214 {
215 len = LINE_BUFFER_LEN - 1;
216 }
217 if (n < 0)
218 {
219 n = 0;
220 }
221 else if (n > len)
222 {
223 n = len;
224 }
225
226 moveto(4, 1);
227 prints(" ------------------------------ \r\n");
228 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
229 memcpy(buf2, buf, (size_t)n);
230 buf2[n] = '\0';
231 prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
232 prints(" ------------------------------ \r\n");
233 iflush();
234 }
235
236 static int bbsnet_connect(int n)
237 {
238 int sock = -1;
239 int ret;
240 int loop;
241 int error;
242 int sock_connected = 0;
243 int flags_sock = -1;
244 int flags_stdin = -1;
245 int flags_stdout = -1;
246 struct sockaddr_in sin;
247 char input_buf[LINE_BUFFER_LEN];
248 char output_buf[LINE_BUFFER_LEN];
249 int input_buf_len = 0;
250 int output_buf_len = 0;
251 int input_buf_offset = 0;
252 int output_buf_offset = 0;
253 char input_conv[LINE_BUFFER_LEN * 2];
254 char output_conv[LINE_BUFFER_LEN * 2];
255 int input_conv_len = 0;
256 int output_conv_len = 0;
257 int input_conv_offset = 0;
258 int output_conv_offset = 0;
259 iconv_t input_cd = (iconv_t)(-1);
260 iconv_t output_cd = (iconv_t)(-1);
261 char tocode[CHARSET_MAX_LEN + 20];
262
263 #ifdef HAVE_SYS_EPOLL_H
264 struct epoll_event ev, events[MAX_EVENTS];
265 int epollfd = -1;
266 #else
267 struct pollfd pfds[3];
268 #endif
269
270 int nfds;
271 int stdin_read_wait = 0;
272 int stdout_write_wait = 0;
273 int sock_read_wait = 0;
274 int sock_write_wait = 0;
275 struct hostent *p_host = NULL;
276 int tos;
277 char remote_addr[IP_ADDR_LEN];
278 int remote_port;
279 char local_addr[IP_ADDR_LEN];
280 int local_port;
281 socklen_t sock_len;
282 time_t t_used = time(NULL);
283 struct tm *tm_used;
284 int ch;
285 char remote_user[USERNAME_MAX_LEN + 1];
286 char remote_pass[PASSWORD_MAX_LEN + 1];
287 ssh_session session = NULL;
288 ssh_channel channel = NULL;
289 int ssh_process_config = 0;
290 int ssh_log_level = SSH_LOG_NOLOG;
291 long ssh_timeout = 0;
292
293 if (user_online_update("BBS_NET") < 0)
294 {
295 log_error("user_online_update(BBS_NET) error\n");
296 }
297
298 if (bbsnet_conf[n].use_ssh)
299 {
300 clearscr();
301
302 if (!SSH_v2)
303 {
304 moveto(1, 1);
305 prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
306 press_any_key();
307 return 0;
308 }
309
310 moveto(1, 1);
311 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
312 moveto(2, 1);
313 prints("请输入用户名: ");
314 iflush();
315 if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
316 {
317 return -1;
318 }
319 if (remote_user[0] == '\0')
320 {
321 return 0;
322 }
323
324 moveto(3, 1);
325 prints("请输入密码: ");
326 iflush();
327 if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
328 {
329 return -1;
330 }
331 if (remote_pass[0] == '\0')
332 {
333 return 0;
334 }
335 }
336
337 clearscr();
338
339 moveto(1, 1);
340 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
341 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
342 iflush();
343
344 p_host = gethostbyname(bbsnet_conf[n].host_name);
345
346 if (p_host == NULL)
347 {
348 prints("\033[1;31m查找主机名失败!\033[m\r\n");
349 press_any_key();
350 goto cleanup;
351 }
352
353 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
354
355 if (sock < 0)
356 {
357 prints("\033[1;31m无法创建socket!\033[m\r\n");
358 press_any_key();
359 goto cleanup;
360 }
361
362 sin.sin_family = AF_INET;
363 sin.sin_addr.s_addr = (BBS_address[0] != '\0' ? inet_addr(BBS_address) : INADDR_ANY);
364 sin.sin_port = 0;
365
366 if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
367 {
368 log_error("Bind address %s:%u failed (%d)\n",
369 inet_ntoa(sin.sin_addr), ntohs(sin.sin_port), errno);
370 goto cleanup;
371 }
372
373 memset(&sin, 0, sizeof(sin));
374 sin.sin_family = AF_INET;
375 sin.sin_addr = *(struct in_addr *)p_host->h_addr_list[0];
376 sin.sin_port = htons(bbsnet_conf[n].port);
377
378 strncpy(remote_addr, inet_ntoa(sin.sin_addr), sizeof(remote_addr) - 1);
379 remote_addr[sizeof(remote_addr) - 1] = '\0';
380 remote_port = ntohs(sin.sin_port);
381
382 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
383 process_bar(0, MAX_PROCESS_BAR_LEN);
384
385 // Set socket as non-blocking
386 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
387 {
388 log_error("fcntl(F_GETFL) error (%d)\n", errno);
389 goto cleanup;
390 }
391 if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
392 {
393 log_error("fcntl(F_SETFL) error (%d)\n", errno);
394 goto cleanup;
395 }
396
397 // Set STDIN/STDOUT as non-blocking
398 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
399 {
400 log_error("fcntl(F_GETFL) error (%d)\n", errno);
401 goto cleanup;
402 }
403 if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
404 {
405 log_error("fcntl(F_GETFL) error (%d)\n", errno);
406 goto cleanup;
407 }
408 if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
409 {
410 log_error("fcntl(F_SETFL) error (%d)\n", errno);
411 goto cleanup;
412 }
413 if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
414 {
415 log_error("fcntl(F_SETFL) error (%d)\n", errno);
416 goto cleanup;
417 }
418
419 #ifdef HAVE_SYS_EPOLL_H
420 epollfd = epoll_create1(0);
421 if (epollfd < 0)
422 {
423 log_error("epoll_create1() error (%d)\n", errno);
424 goto cleanup;
425 }
426
427 ev.events = EPOLLOUT | EPOLLET;
428 ev.data.fd = sock;
429 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
430 {
431 log_error("epoll_ctl(socket) error (%d)\n", errno);
432 goto cleanup;
433 }
434
435 ev.events = EPOLLIN | EPOLLET;
436 ev.data.fd = STDIN_FILENO;
437 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
438 {
439 log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
440 goto cleanup;
441 }
442 #endif
443
444 while (!SYS_server_exit)
445 {
446 if ((ret = connect(sock, (struct sockaddr *)&sin, sizeof(sin))) < 0)
447 {
448 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
449 {
450 // Use select / epoll to check writability of the socket,
451 // then use getsockopt to check the status of the socket.
452 // See man connect(2)
453 break;
454 }
455 else if (errno == EINTR)
456 {
457 continue;
458 }
459 else
460 {
461 log_error("connect(socket) error (%d)\n", errno);
462
463 prints("\033[1;31m连接失败!\033[m\r\n");
464 press_any_key();
465
466 goto cleanup;
467 }
468 }
469 }
470
471 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
472 {
473 #ifdef HAVE_SYS_EPOLL_H
474 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
475 ret = nfds;
476 #else
477 pfds[0].fd = sock;
478 pfds[0].events = POLLOUT;
479 pfds[1].fd = STDIN_FILENO;
480 pfds[1].events = POLLIN;
481 nfds = 2;
482 ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
483 #endif
484
485 if (ret < 0)
486 {
487 if (errno != EINTR)
488 {
489 #ifdef HAVE_SYS_EPOLL_H
490 log_error("epoll_wait() error (%d)\n", errno);
491 #else
492 log_error("poll() error (%d)\n", errno);
493 #endif
494 break;
495 }
496 }
497 else if (ret == 0) // timeout
498 {
499 process_bar(j + 1, MAX_PROCESS_BAR_LEN);
500 }
501 else // ret > 0
502 {
503 for (int i = 0; i < nfds; i++)
504 {
505 #ifdef HAVE_SYS_EPOLL_H
506 if (events[i].data.fd == sock)
507 #else
508 if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
509 #endif
510 {
511 socklen_t len = sizeof(error);
512 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
513 {
514 log_error("getsockopt() error (%d) !\n", errno);
515 goto cleanup;
516 }
517 if (error == 0)
518 {
519 sock_connected = 1;
520 }
521 }
522 #ifdef HAVE_SYS_EPOLL_H
523 else if (events[i].data.fd == STDIN_FILENO)
524 #else
525 else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
526 #endif
527 {
528 do
529 {
530 ch = igetch(0);
531 } while (ch == 0);
532 if (ch == Ctrl('C') || ch == KEY_ESC)
533 {
534 goto cleanup;
535 }
536 }
537 }
538 }
539 }
540 if (SYS_server_exit)
541 {
542 goto cleanup;
543 }
544 if (!sock_connected)
545 {
546 prints("\033[1;31m连接失败!\033[m\r\n");
547 press_any_key();
548
549 goto cleanup;
550 }
551
552 tos = IPTOS_LOWDELAY;
553 if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
554 {
555 log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
556 }
557
558 sock_len = sizeof(sin);
559 if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
560 {
561 log_error("getsockname() error: %d", errno);
562 goto cleanup;
563 }
564
565 strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
566 local_addr[sizeof(local_addr) - 1] = '\0';
567 local_port = ntohs(sin.sin_port);
568
569 if (bbsnet_conf[n].use_ssh)
570 {
571 session = ssh_new();
572 if (session == NULL)
573 {
574 log_error("ssh_new() error\n");
575 goto cleanup;
576 }
577
578 if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
579 ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
580 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
581 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
582 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
583 ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
584 ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
585 {
586 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
587 goto cleanup;
588 }
589
590 ssh_timeout = 5; // second
591 if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
592 {
593 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
594 goto cleanup;
595 }
596
597 while (!SYS_server_exit)
598 {
599 ret = ssh_connect(session);
600 if (ret == SSH_OK)
601 {
602 break;
603 }
604 else if (ret == SSH_ERROR)
605 {
606 log_error("ssh_connect() error\n");
607 goto cleanup;
608 }
609 }
610
611 ret = ssh_session_is_known_server(session);
612 switch (ret)
613 {
614 case SSH_KNOWN_HOSTS_NOT_FOUND:
615 case SSH_KNOWN_HOSTS_UNKNOWN:
616 if (ssh_session_update_known_hosts(session) != SSH_OK)
617 {
618 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
619 prints("\033[1;31m无法添加服务器证书\033[m");
620 press_any_key();
621 goto cleanup;
622 }
623 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
624 case SSH_KNOWN_HOSTS_OK:
625 break;
626 case SSH_KNOWN_HOSTS_CHANGED:
627 case SSH_KNOWN_HOSTS_OTHER:
628 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
629 prints("\033[1;31m服务器证书已变更\033[m");
630 press_any_key();
631 goto cleanup;
632 }
633
634 for (int i = 0; !SYS_server_exit;)
635 {
636 ret = ssh_userauth_password(session, NULL, remote_pass);
637 if (ret == SSH_AUTH_SUCCESS)
638 {
639 break;
640 }
641 else if (ret == SSH_AUTH_AGAIN)
642 {
643 #ifdef _DEBUG
644 log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
645 #endif
646 }
647 else if (ret == SSH_AUTH_ERROR)
648 {
649 log_error("ssh_userauth_password() error: %d\n", ret);
650 goto cleanup;
651 }
652 else // if (ret == SSH_AUTH_DENIED)
653 {
654 prints("\033[1;31m身份验证失败!\033[m\r\n");
655 i++;
656 if (i < BBS_login_retry_times)
657 {
658 prints("请输入密码: ");
659 iflush();
660 if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
661 {
662 goto cleanup;
663 }
664 if (remote_pass[0] == '\0')
665 {
666 goto cleanup;
667 }
668 }
669 else
670 {
671 goto cleanup;
672 }
673 }
674 }
675
676 channel = ssh_channel_new(session);
677 if (channel == NULL)
678 {
679 log_error("ssh_channel_new() error\n");
680 goto cleanup;
681 }
682
683 while (!SYS_server_exit)
684 {
685 ret = ssh_channel_open_session(channel);
686 if (ret == SSH_OK)
687 {
688 break;
689 }
690 else if (ret == SSH_ERROR)
691 {
692 log_error("ssh_channel_open_session() error\n");
693 goto cleanup;
694 }
695 }
696
697 while (!SYS_server_exit)
698 {
699 ret = ssh_channel_request_pty(channel);
700 if (ret == SSH_OK)
701 {
702 break;
703 }
704 else if (ret == SSH_ERROR)
705 {
706 log_error("ssh_channel_request_pty() error\n");
707 goto cleanup;
708 }
709 }
710
711 while (!SYS_server_exit)
712 {
713 ret = ssh_channel_request_shell(channel);
714 if (ret == SSH_OK)
715 {
716 break;
717 }
718 else if (ret == SSH_ERROR)
719 {
720 log_error("ssh_channel_request_shell() error\n");
721 goto cleanup;
722 }
723 }
724
725 ssh_timeout = 0; // second
726 if (ssh_options_set(session, SSH_OPTIONS_TIMEOUT, &ssh_timeout) < 0)
727 {
728 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
729 goto cleanup;
730 }
731
732 ssh_set_blocking(session, 0);
733 }
734
735 prints("\033[1;31m连接成功!\033[m\r\n");
736 iflush();
737 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
738 remote_addr, remote_port, local_addr, local_port, BBS_username);
739
740 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
741 (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
742 input_cd = iconv_open(tocode, stdio_charset);
743 if (input_cd == (iconv_t)(-1))
744 {
745 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
746 goto cleanup;
747 }
748
749 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
750 (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
751 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
752 if (output_cd == (iconv_t)(-1))
753 {
754 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
755 goto cleanup;
756 }
757
758 #ifdef HAVE_SYS_EPOLL_H
759 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
760 ev.data.fd = sock;
761 if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
762 {
763 log_error("epoll_ctl(socket) error (%d)\n", errno);
764 goto cleanup;
765 }
766
767 ev.events = EPOLLOUT | EPOLLET;
768 ev.data.fd = STDOUT_FILENO;
769 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
770 {
771 log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
772 goto cleanup;
773 }
774 #endif
775
776 BBS_last_access_tm = t_used = time(NULL);
777 loop = 1;
778
779 while (loop && !SYS_server_exit)
780 {
781 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
782 {
783 log_error("SSH channel is closed\n");
784 loop = 0;
785 break;
786 }
787
788 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
789 {
790 log_error("Remote SSH channel is closed\n");
791 loop = 0;
792 break;
793 }
794
795 #ifdef HAVE_SYS_EPOLL_H
796 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
797 ret = nfds;
798 #else
799 pfds[0].fd = STDIN_FILENO;
800 pfds[0].events = POLLIN;
801 pfds[1].fd = sock;
802 pfds[1].events = POLLIN | POLLOUT;
803 pfds[2].fd = STDOUT_FILENO;
804 pfds[2].events = POLLOUT;
805 nfds = 3;
806 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
807 #endif
808
809 if (ret < 0)
810 {
811 if (errno != EINTR)
812 {
813 #ifdef HAVE_SYS_EPOLL_H
814 log_error("epoll_wait() error (%d)\n", errno);
815 #else
816 log_error("poll() error (%d)\n", errno);
817 #endif
818 break;
819 }
820 continue;
821 }
822 else if (ret == 0) // timeout
823 {
824 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
825 {
826 break;
827 }
828 }
829
830 for (int i = 0; i < nfds; i++)
831 {
832 #ifdef HAVE_SYS_EPOLL_H
833 if (events[i].data.fd == STDIN_FILENO)
834 #else
835 if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
836 #endif
837 {
838 stdin_read_wait = 1;
839 }
840
841 #ifdef HAVE_SYS_EPOLL_H
842 if (events[i].data.fd == sock)
843 #else
844 if (pfds[i].fd == sock)
845 #endif
846 {
847 #ifdef HAVE_SYS_EPOLL_H
848 if (events[i].events & EPOLLIN)
849 #else
850 if (pfds[i].revents & POLLIN)
851 #endif
852 {
853 sock_read_wait = 1;
854 }
855
856 #ifdef HAVE_SYS_EPOLL_H
857 if (events[i].events & EPOLLOUT)
858 #else
859 if (pfds[i].revents & POLLOUT)
860 #endif
861 {
862 sock_write_wait = 1;
863 }
864 }
865
866 #ifdef HAVE_SYS_EPOLL_H
867 if (events[i].data.fd == STDOUT_FILENO)
868 #else
869 if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
870 #endif
871 {
872 stdout_write_wait = 1;
873 }
874 }
875
876 if (stdin_read_wait)
877 {
878 while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
879 {
880 if (SSH_v2)
881 {
882 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
883 if (ret == SSH_ERROR)
884 {
885 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
886 loop = 0;
887 break;
888 }
889 else if (ret == SSH_EOF)
890 {
891 stdin_read_wait = 0;
892 loop = 0;
893 break;
894 }
895 else if (ret == 0)
896 {
897 // Send NO-OP to remote server
898 input_buf[input_buf_len] = '\0';
899 input_buf_len++;
900 BBS_last_access_tm = time(NULL);
901
902 stdin_read_wait = 0;
903 break; // Check whether channel is still open
904 }
905 }
906 else
907 {
908 ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
909 }
910 if (ret < 0)
911 {
912 if (errno == EAGAIN || errno == EWOULDBLOCK)
913 {
914 stdin_read_wait = 0;
915 break;
916 }
917 else if (errno == EINTR)
918 {
919 continue;
920 }
921 else
922 {
923 log_error("read(STDIN) error (%d)\n", errno);
924 loop = 0;
925 break;
926 }
927 }
928 else if (ret == 0) // broken pipe
929 {
930 #ifdef _DEBUG
931 log_error("read(STDIN) EOF\n");
932 #endif
933 stdin_read_wait = 0;
934 loop = 0;
935 break;
936 }
937 else
938 {
939 input_buf_len += ret;
940 BBS_last_access_tm = time(NULL);
941
942 // Refresh current action while user input
943 if (user_online_update("BBS_NET") < 0)
944 {
945 log_error("user_online_update(BBS_NET) error\n");
946 }
947
948 continue;
949 }
950 }
951 }
952
953 if (sock_write_wait)
954 {
955 if (input_buf_offset < input_buf_len)
956 {
957 // For debug
958 #ifdef _DEBUG
959 for (int j = input_buf_offset; j < input_buf_len; j++)
960 {
961 log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
962 }
963 #endif
964
965 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
966 if (ret < 0)
967 {
968 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
969 input_buf_len = input_buf_offset; // Discard invalid sequence
970 }
971
972 // For debug
973 #ifdef _DEBUG
974 for (int j = input_conv_offset; j < input_conv_len; j++)
975 {
976 log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
977 }
978 #endif
979 }
980
981 while (input_conv_offset < input_conv_len && !SYS_server_exit)
982 {
983 if (bbsnet_conf[n].use_ssh)
984 {
985 ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
986 if (ret == SSH_ERROR)
987 {
988 log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
989 loop = 0;
990 break;
991 }
992 }
993 else
994 {
995 ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
996 }
997 if (ret < 0)
998 {
999 if (errno == EAGAIN || errno == EWOULDBLOCK)
1000 {
1001 sock_write_wait = 0;
1002 break;
1003 }
1004 else if (errno == EINTR)
1005 {
1006 continue;
1007 }
1008 else
1009 {
1010 log_error("write(socket) error (%d)\n", errno);
1011 loop = 0;
1012 break;
1013 }
1014 }
1015 else if (ret == 0) // broken pipe
1016 {
1017 #ifdef _DEBUG
1018 log_error("write(socket) EOF\n");
1019 #endif
1020 sock_write_wait = 0;
1021 loop = 0;
1022 break;
1023 }
1024 else
1025 {
1026 input_conv_offset += ret;
1027 if (input_conv_offset >= input_conv_len) // Output buffer complete
1028 {
1029 input_conv_offset = 0;
1030 input_conv_len = 0;
1031 break;
1032 }
1033 continue;
1034 }
1035 }
1036 }
1037
1038 if (sock_read_wait)
1039 {
1040 while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1041 {
1042 if (bbsnet_conf[n].use_ssh)
1043 {
1044 ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
1045 (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1046 if (ret == SSH_ERROR)
1047 {
1048 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
1049 loop = 0;
1050 break;
1051 }
1052 else if (ret == SSH_EOF)
1053 {
1054 sock_read_wait = 0;
1055 loop = 0;
1056 break;
1057 }
1058 else if (ret == 0)
1059 {
1060 sock_read_wait = 0;
1061 break;
1062 }
1063 }
1064 else
1065 {
1066 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1067 }
1068 if (ret < 0)
1069 {
1070 if (errno == EAGAIN || errno == EWOULDBLOCK)
1071 {
1072 sock_read_wait = 0;
1073 break;
1074 }
1075 else if (errno == EINTR)
1076 {
1077 continue;
1078 }
1079 else
1080 {
1081 log_error("read(socket) error (%d)\n", errno);
1082 loop = 0;
1083 break;
1084 }
1085 }
1086 else if (ret == 0) // broken pipe
1087 {
1088 #ifdef _DEBUG
1089 log_error("read(socket) EOF\n");
1090 #endif
1091 sock_read_wait = 0;
1092 loop = 0;
1093 break;
1094 }
1095 else
1096 {
1097 output_buf_len += ret;
1098 continue;
1099 }
1100 }
1101 }
1102
1103 if (stdout_write_wait)
1104 {
1105 if (output_buf_offset < output_buf_len)
1106 {
1107 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1108 if (ret < 0)
1109 {
1110 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1111 output_buf_len = output_buf_offset; // Discard invalid sequence
1112 }
1113 }
1114
1115 while (output_conv_offset < output_conv_len && !SYS_server_exit)
1116 {
1117 if (SSH_v2)
1118 {
1119 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1120 if (ret == SSH_ERROR)
1121 {
1122 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1123 loop = 0;
1124 break;
1125 }
1126 }
1127 else
1128 {
1129 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1130 }
1131 if (ret < 0)
1132 {
1133 if (errno == EAGAIN || errno == EWOULDBLOCK)
1134 {
1135 stdout_write_wait = 0;
1136 break;
1137 }
1138 else if (errno == EINTR)
1139 {
1140 continue;
1141 }
1142 else
1143 {
1144 log_error("write(STDOUT) error (%d)\n", errno);
1145 loop = 0;
1146 break;
1147 }
1148 }
1149 else if (ret == 0) // broken pipe
1150 {
1151 #ifdef _DEBUG
1152 log_error("write(STDOUT) EOF\n");
1153 #endif
1154 stdout_write_wait = 0;
1155 loop = 0;
1156 break;
1157 }
1158 else
1159 {
1160 output_conv_offset += ret;
1161 if (output_conv_offset >= output_conv_len) // Output buffer complete
1162 {
1163 output_conv_offset = 0;
1164 output_conv_len = 0;
1165 break;
1166 }
1167 continue;
1168 }
1169 }
1170 }
1171 }
1172
1173 cleanup:
1174 if (input_cd != (iconv_t)(-1))
1175 {
1176 iconv_close(input_cd);
1177 }
1178 if (output_cd != (iconv_t)(-1))
1179 {
1180 iconv_close(output_cd);
1181 }
1182
1183 #ifdef HAVE_SYS_EPOLL_H
1184 if (epollfd != -1 && close(epollfd) < 0)
1185 {
1186 log_error("close(epoll) error (%d)\n");
1187 }
1188 #endif
1189
1190 if (bbsnet_conf[n].use_ssh)
1191 {
1192 if (channel != NULL)
1193 {
1194 ssh_channel_free(channel);
1195 }
1196 if (session != NULL)
1197 {
1198 ssh_disconnect(session);
1199 ssh_free(session);
1200 }
1201 }
1202
1203 // Restore STDIN/STDOUT flags
1204 if (flags_stdin != -1 &&fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1205 {
1206 log_error("fcntl(F_SETFL) error (%d)\n", errno);
1207 }
1208 if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1209 {
1210 log_error("fcntl(F_SETFL) error (%d)\n", errno);
1211 }
1212
1213 if (sock != -1 && close(sock) == -1)
1214 {
1215 log_error("Close socket failed\n");
1216 }
1217
1218 t_used = time(NULL) - t_used;
1219 tm_used = gmtime(&t_used);
1220
1221 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1222 tm_used->tm_mday - 1, tm_used->tm_hour, tm_used->tm_min,
1223 tm_used->tm_sec);
1224
1225 BBS_last_access_tm = time(NULL);
1226
1227 return 0;
1228 }
1229
1230 static int bbsnet_refresh()
1231 {
1232 clearscr();
1233
1234 moveto(1, 1);
1235 prints(" ------------------------------------------------------------------------------ ");
1236 for (int i = 2; i < 19; i++)
1237 {
1238 moveto(i, 1);
1239 prints("|");
1240 moveto(i, 80);
1241 prints("|");
1242 }
1243 moveto(19, 1);
1244 prints("|------------------------------------------------------------------------------|");
1245 moveto(22, 1);
1246 prints(" ------------------------------------------------------------------------------ ");
1247 moveto(23, 1);
1248 prints(" [\033[1;32mCtrl+C\033[m]退出");
1249
1250 iflush();
1251
1252 return 0;
1253 }
1254
1255 static int bbsnet_selchange()
1256 {
1257 int i = bbsnet_menu.menu_item_pos[0];
1258
1259 moveto(20, 1);
1260 clrtoeol();
1261 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1262 bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1263 bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1264 (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1265 moveto(20, 80);
1266 prints("|");
1267 moveto(21, 1);
1268 clrtoeol();
1269 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5d\033[m 编码: \033[1;33m%s\033[m",
1270 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1271 moveto(21, 80);
1272 prints("|");
1273 iflush();
1274
1275 return 0;
1276 }
1277
1278 int bbs_net()
1279 {
1280 int ch, i;
1281
1282 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1283 {
1284 clearscr();
1285 moveto(1, 1);
1286 prints("加载穿梭配置失败!");
1287 press_any_key();
1288 return -1;
1289 }
1290
1291 bbsnet_refresh();
1292 display_menu(&bbsnet_menu);
1293 bbsnet_selchange();
1294
1295 while (!SYS_server_exit)
1296 {
1297 ch = igetch(100);
1298
1299 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1300 {
1301 BBS_last_access_tm = time(NULL);
1302 }
1303
1304 switch (ch)
1305 {
1306 case KEY_NULL: // broken pipe
1307 log_error("KEY_NULL\n");
1308 goto cleanup;
1309 case KEY_TIMEOUT:
1310 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1311 {
1312 log_error("User input timeout\n");
1313 goto cleanup;
1314 }
1315 continue;
1316 case KEY_ESC:
1317 case Ctrl('C'): // user cancel
1318 goto cleanup;
1319 case CR:
1320 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1321 // Force cleanup anything remaining in the output buffer
1322 clearscr();
1323 iflush();
1324 // Clear screen and redraw menu
1325 bbsnet_refresh();
1326 display_menu(&bbsnet_menu);
1327 bbsnet_selchange();
1328 break;
1329 case KEY_UP:
1330 for (i = 0; i < STATION_PER_LINE; i++)
1331 {
1332 menu_control(&bbsnet_menu, KEY_UP);
1333 }
1334 bbsnet_selchange();
1335 break;
1336 case KEY_DOWN:
1337 for (i = 0; i < STATION_PER_LINE; i++)
1338 {
1339 menu_control(&bbsnet_menu, KEY_DOWN);
1340 }
1341 bbsnet_selchange();
1342 break;
1343 case KEY_LEFT:
1344 menu_control(&bbsnet_menu, KEY_UP);
1345 bbsnet_selchange();
1346 break;
1347 case KEY_RIGHT:
1348 menu_control(&bbsnet_menu, KEY_DOWN);
1349 bbsnet_selchange();
1350 break;
1351 case KEY_HOME:
1352 case KEY_PGUP:
1353 menu_control(&bbsnet_menu, KEY_PGUP);
1354 bbsnet_selchange();
1355 break;
1356 case KEY_END:
1357 case KEY_PGDN:
1358 menu_control(&bbsnet_menu, KEY_PGDN);
1359 bbsnet_selchange();
1360 break;
1361 default:
1362 menu_control(&bbsnet_menu, ch);
1363 bbsnet_selchange();
1364 break;
1365 }
1366 }
1367
1368 cleanup:
1369 unload_bbsnet_conf();
1370
1371 return 0;
1372 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1