/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Contents of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.94 - (show annotations)
Thu Dec 18 02:17:39 2025 UTC (2 months, 4 weeks ago) by sysadm
Branch: MAIN
Changes since 1.93: +19 -2 lines
Content type: text/x-csrc
Add handling of error events (EPOLLRDHUP | EPOLLHUP | EPOLLERR)

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * bbs_net
4 * - user interactive feature of site shuttle
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 #ifdef HAVE_CONFIG_H
10 #include "config.h"
11 #endif
12
13 #include "bbs.h"
14 #include "bbs_net.h"
15 #include "common.h"
16 #include "io.h"
17 #include "log.h"
18 #include "login.h"
19 #include "menu.h"
20 #include "screen.h"
21 #include "str_process.h"
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <netdb.h>
25 #include <stdarg.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <time.h>
30 #include <unistd.h>
31 #include <arpa/inet.h>
32 #include <ctype.h>
33 #include <libssh/libssh.h>
34 #include <libssh/server.h>
35 #include <libssh/callbacks.h>
36 #include <netinet/in.h>
37 #include <netinet/ip.h>
38 #include <sys/select.h>
39 #include <sys/ioctl.h>
40 #include <sys/socket.h>
41
42 #ifdef HAVE_SYS_EPOLL_H
43 #include <sys/epoll.h>
44 #else
45 #include <poll.h>
46 #endif
47
48 static const char MENU_CONF_DELIM[] = " \t\r\n";
49
50 enum _bbs_net_constant_t
51 {
52 MAX_PROCESS_BAR_LEN = 30,
53 MAXSTATION = 26 * 2,
54 STATION_PER_LINE = 4,
55 USERNAME_MAX_LEN = 20,
56 PASSWORD_MAX_LEN = 20,
57 SSH_CONNECT_TIMEOUT = 5, // seconds
58 };
59
60 struct _bbsnet_conf
61 {
62 char org_name[40];
63 char site_name[40];
64 char host_name[IP_ADDR_LEN];
65 char port[6];
66 int8_t use_ssh;
67 char charset[CHARSET_MAX_LEN + 1];
68 } bbsnet_conf[MAXSTATION];
69
70 static MENU_SET bbsnet_menu;
71
72 static void unload_bbsnet_conf(void);
73
74 static int load_bbsnet_conf(const char *file_config)
75 {
76 FILE *fp;
77 MENU *p_menu;
78 MENU_ITEM *p_menu_item;
79 MENU_ITEM_ID menu_item_id;
80 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
81 int port;
82
83 unload_bbsnet_conf();
84
85 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
86 if (bbsnet_menu.p_menu_pool == NULL)
87 {
88 log_error("calloc(p_menu_pool) error\n");
89 return -1;
90 }
91 bbsnet_menu.menu_count = 1;
92
93 bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
94 if (bbsnet_menu.p_menu_item_pool == NULL)
95 {
96 log_error("calloc(p_menu_item_pool) error\n");
97 unload_bbsnet_conf();
98 return -1;
99 }
100 bbsnet_menu.menu_item_count = MAXSTATION;
101
102 p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
103
104 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
105 p_menu->name[sizeof(p_menu->name) - 1] = '\0';
106 p_menu->title.show = 0;
107 p_menu->screen_show = 0;
108
109 fp = fopen(file_config, "r");
110 if (fp == NULL)
111 {
112 unload_bbsnet_conf();
113 return -2;
114 }
115
116 menu_item_id = 0;
117 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
118 {
119 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
120 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
121 t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
122 t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
125
126 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
127 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
128 {
129 continue;
130 }
131
132 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
133 bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
134 strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
135 bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
136 strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
137 bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
138 port = atoi(t4);
139 if (port <= 0 || port > 65535)
140 {
141 log_error("Invalid port value %d of menu item %d\n", port, menu_item_id);
142 fclose(fp);
143 unload_bbsnet_conf();
144 return -3;
145 }
146 strncpy(bbsnet_conf[menu_item_id].port, t4, sizeof(bbsnet_conf[menu_item_id].port) - 1);
147 bbsnet_conf[menu_item_id].port[sizeof(bbsnet_conf[menu_item_id].port) - 1] = '\0';
148 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
149 strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
150 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
151
152 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
153 if (p_menu_item == NULL)
154 {
155 log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
156 fclose(fp);
157 unload_bbsnet_conf();
158 return -3;
159 }
160
161 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
162 p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
163 snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
164 p_menu_item->submenu = 0;
165 p_menu_item->priv = 0;
166 p_menu_item->level = 0;
167 p_menu_item->name[0] =
168 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
169 p_menu_item->name[1] = '\0';
170 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
171 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
172
173 p_menu->items[p_menu->item_count] = menu_item_id;
174 p_menu->item_count++;
175 menu_item_id++;
176 }
177
178 bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
179 bbsnet_menu.menu_id_path[0] = 0;
180 bbsnet_menu.menu_item_pos[0] = 0;
181 bbsnet_menu.choose_step = 0;
182
183 fclose(fp);
184
185 return 0;
186 }
187
188 static void unload_bbsnet_conf(void)
189 {
190 bbsnet_menu.menu_count = 0;
191 bbsnet_menu.menu_item_count = 0;
192
193 if (bbsnet_menu.p_menu_pool)
194 {
195 free(bbsnet_menu.p_menu_pool);
196 bbsnet_menu.p_menu_pool = NULL;
197 }
198
199 if (bbsnet_menu.p_menu_item_pool)
200 {
201 free(bbsnet_menu.p_menu_item_pool);
202 bbsnet_menu.p_menu_item_pool = NULL;
203 }
204 }
205
206 static void process_bar(int n, int len)
207 {
208 char buf[LINE_BUFFER_LEN];
209 char buf2[LINE_BUFFER_LEN];
210
211 if (len <= 0)
212 {
213 len = 1;
214 }
215 else if (len > LINE_BUFFER_LEN)
216 {
217 len = LINE_BUFFER_LEN - 1;
218 }
219 if (n < 0)
220 {
221 n = 0;
222 }
223 else if (n > len)
224 {
225 n = len;
226 }
227
228 moveto(4, 1);
229 prints(" ------------------------------ \r\n");
230 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
231 memcpy(buf2, buf, (size_t)n);
232 buf2[n] = '\0';
233 prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
234 prints(" ------------------------------ \r\n");
235 iflush();
236 }
237
238 static int bbsnet_connect(int n)
239 {
240 int sock = -1;
241 int ret;
242 int loop;
243 int error;
244 int sock_connected = 0;
245 int flags_sock = -1;
246 int flags_stdin = -1;
247 int flags_stdout = -1;
248 struct sockaddr_in sin;
249 char input_buf[LINE_BUFFER_LEN];
250 char output_buf[LINE_BUFFER_LEN];
251 int input_buf_len = 0;
252 int output_buf_len = 0;
253 int input_buf_offset = 0;
254 int output_buf_offset = 0;
255 char input_conv[LINE_BUFFER_LEN * 2];
256 char output_conv[LINE_BUFFER_LEN * 2];
257 int input_conv_len = 0;
258 int output_conv_len = 0;
259 int input_conv_offset = 0;
260 int output_conv_offset = 0;
261 iconv_t input_cd = (iconv_t)(-1);
262 iconv_t output_cd = (iconv_t)(-1);
263 char tocode[CHARSET_MAX_LEN + 20];
264
265 #ifdef HAVE_SYS_EPOLL_H
266 struct epoll_event ev, events[MAX_EVENTS];
267 int epollfd = -1;
268 #else
269 struct pollfd pfds[3];
270 #endif
271
272 int nfds;
273 int stdin_read_wait = 0;
274 int stdout_write_wait = 0;
275 int sock_read_wait = 0;
276 int sock_write_wait = 0;
277 struct addrinfo hints, *res = NULL;
278 int tos;
279 char remote_addr[INET_ADDRSTRLEN];
280 int remote_port;
281 char local_addr[INET_ADDRSTRLEN];
282 int local_port;
283 socklen_t sock_len;
284 time_t t_begin;
285 time_t t_used = time(NULL);
286 struct tm *tm_used;
287 int ch;
288 char remote_user[USERNAME_MAX_LEN + 1];
289 char remote_pass[PASSWORD_MAX_LEN + 1];
290 ssh_session session = NULL;
291 ssh_channel channel = NULL;
292 int ssh_process_config = 0;
293 int ssh_log_level = SSH_LOG_NOLOG;
294
295 if (user_online_update("BBS_NET") < 0)
296 {
297 log_error("user_online_update(BBS_NET) error\n");
298 }
299
300 if (bbsnet_conf[n].use_ssh)
301 {
302 clearscr();
303
304 if (!SSH_v2)
305 {
306 moveto(1, 1);
307 prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
308 press_any_key();
309 return 0;
310 }
311
312 moveto(1, 1);
313 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
314 moveto(2, 1);
315 prints("请输入用户名: ");
316 iflush();
317 if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
318 {
319 return -1;
320 }
321 if (remote_user[0] == '\0')
322 {
323 return 0;
324 }
325
326 moveto(3, 1);
327 prints("请输入密码: ");
328 iflush();
329 if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
330 {
331 return -1;
332 }
333 if (remote_pass[0] == '\0')
334 {
335 return 0;
336 }
337 }
338
339 clearscr();
340
341 moveto(1, 1);
342 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
343 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
344 iflush();
345
346 memset(&hints, 0, sizeof(hints));
347 hints.ai_family = AF_INET;
348 hints.ai_socktype = SOCK_STREAM;
349 hints.ai_protocol = IPPROTO_TCP;
350
351 if ((ret = getaddrinfo(BBS_address, NULL, &hints, &res)) != 0)
352 {
353 log_error("getaddrinfo() error (%d)\n", ret);
354 goto cleanup;
355 }
356
357 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr), local_addr, sizeof(local_addr)) == NULL)
358 {
359 log_error("inet_ntop() error (%d)\n", errno);
360 goto cleanup;
361 }
362 local_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
363
364 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
365 if (sock < 0)
366 {
367 log_error("socket() error (%d)\n", errno);
368 goto cleanup;
369 }
370
371 if (bind(sock, res->ai_addr, res->ai_addrlen) < 0)
372 {
373 log_error("bind(%s:%u) error (%d)\n", local_addr, local_port, errno);
374 goto cleanup;
375 }
376
377 freeaddrinfo(res);
378 res = NULL;
379
380 memset(&hints, 0, sizeof(hints));
381 hints.ai_family = AF_INET;
382 hints.ai_flags = AI_NUMERICSERV;
383 hints.ai_socktype = SOCK_STREAM;
384 hints.ai_protocol = IPPROTO_TCP;
385
386 if ((ret = getaddrinfo(bbsnet_conf[n].host_name, bbsnet_conf[n].port, &hints, &res)) != 0)
387 {
388 log_error("getaddrinfo() error (%d)\n", ret);
389 prints("\033[1;31m查找主机名失败!\033[m\r\n");
390 press_any_key();
391 goto cleanup;
392 }
393
394 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr), remote_addr, sizeof(remote_addr)) == NULL)
395 {
396 log_error("inet_ntop() error (%d)\n", errno);
397 goto cleanup;
398 }
399 remote_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
400
401 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
402 process_bar(0, MAX_PROCESS_BAR_LEN);
403
404 // Set socket as non-blocking
405 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
406 {
407 log_error("fcntl(F_GETFL) error (%d)\n", errno);
408 goto cleanup;
409 }
410 if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
411 {
412 log_error("fcntl(F_SETFL) error (%d)\n", errno);
413 goto cleanup;
414 }
415
416 // Set STDIN/STDOUT as non-blocking
417 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
418 {
419 log_error("fcntl(F_GETFL) error (%d)\n", errno);
420 goto cleanup;
421 }
422 if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
423 {
424 log_error("fcntl(F_GETFL) error (%d)\n", errno);
425 goto cleanup;
426 }
427 if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
428 {
429 log_error("fcntl(F_SETFL) error (%d)\n", errno);
430 goto cleanup;
431 }
432 if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
433 {
434 log_error("fcntl(F_SETFL) error (%d)\n", errno);
435 goto cleanup;
436 }
437
438 #ifdef HAVE_SYS_EPOLL_H
439 epollfd = epoll_create1(0);
440 if (epollfd < 0)
441 {
442 log_error("epoll_create1() error (%d)\n", errno);
443 goto cleanup;
444 }
445
446 ev.events = EPOLLOUT | EPOLLET;
447 ev.data.fd = sock;
448 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
449 {
450 log_error("epoll_ctl(socket) error (%d)\n", errno);
451 goto cleanup;
452 }
453
454 ev.events = EPOLLIN | EPOLLET;
455 ev.data.fd = STDIN_FILENO;
456 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
457 {
458 log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
459 goto cleanup;
460 }
461 #endif
462
463 while (!SYS_server_exit)
464 {
465 if ((ret = connect(sock, res->ai_addr, res->ai_addrlen)) < 0)
466 {
467 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
468 {
469 // Use select / epoll to check writability of the socket,
470 // then use getsockopt to check the status of the socket.
471 // See man connect(2)
472 break;
473 }
474 else if (errno == EINTR)
475 {
476 continue;
477 }
478 else
479 {
480 log_error("connect(socket) error (%d)\n", errno);
481 prints("\033[1;31m连接失败!\033[m\r\n");
482 press_any_key();
483 goto cleanup;
484 }
485 }
486 }
487
488 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
489 {
490 #ifdef HAVE_SYS_EPOLL_H
491 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
492 ret = nfds;
493 #else
494 pfds[0].fd = sock;
495 pfds[0].events = POLLOUT;
496 pfds[1].fd = STDIN_FILENO;
497 pfds[1].events = POLLIN;
498 nfds = 2;
499 ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
500 #endif
501
502 if (ret < 0)
503 {
504 if (errno != EINTR)
505 {
506 #ifdef HAVE_SYS_EPOLL_H
507 log_error("epoll_wait() error (%d)\n", errno);
508 #else
509 log_error("poll() error (%d)\n", errno);
510 #endif
511 break;
512 }
513 }
514 else if (ret == 0) // timeout
515 {
516 process_bar(j + 1, MAX_PROCESS_BAR_LEN);
517 }
518 else // ret > 0
519 {
520 for (int i = 0; i < nfds; i++)
521 {
522 #ifdef HAVE_SYS_EPOLL_H
523 if (events[i].data.fd == sock)
524 #else
525 if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
526 #endif
527 {
528 socklen_t len = sizeof(error);
529 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
530 {
531 log_error("getsockopt() error (%d) !\n", errno);
532 goto cleanup;
533 }
534 if (error == 0)
535 {
536 sock_connected = 1;
537 }
538 }
539 #ifdef HAVE_SYS_EPOLL_H
540 else if (events[i].data.fd == STDIN_FILENO)
541 #else
542 else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
543 #endif
544 {
545 do
546 {
547 ch = igetch(0);
548 } while (ch == 0);
549 if (ch == Ctrl('C') || ch == KEY_ESC)
550 {
551 goto cleanup;
552 }
553 }
554 }
555 }
556 }
557 if (SYS_server_exit)
558 {
559 goto cleanup;
560 }
561 if (!sock_connected)
562 {
563 prints("\033[1;31m连接失败!\033[m\r\n");
564 press_any_key();
565 goto cleanup;
566 }
567
568 tos = IPTOS_LOWDELAY;
569 if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
570 {
571 log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
572 }
573
574 sock_len = sizeof(sin);
575 if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
576 {
577 log_error("getsockname() error: %d", errno);
578 goto cleanup;
579 }
580
581 strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
582 local_addr[sizeof(local_addr) - 1] = '\0';
583 local_port = ntohs(sin.sin_port);
584
585 if (bbsnet_conf[n].use_ssh)
586 {
587 session = ssh_new();
588 if (session == NULL)
589 {
590 log_error("ssh_new() error\n");
591 goto cleanup;
592 }
593
594 if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
595 ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
596 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
597 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
598 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
599 ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
600 ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
601 {
602 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
603 goto cleanup;
604 }
605
606 ssh_set_blocking(session, 0);
607
608 t_begin = time(NULL);
609 ret = SSH_ERROR;
610 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
611 {
612 ret = ssh_connect(session);
613 if (ret == SSH_OK)
614 {
615 break;
616 }
617 else if (ret == SSH_AGAIN)
618 {
619 // log_error("ssh_connect() error: SSH_AGAIN\n");
620 }
621 else // if (ret == SSH_ERROR)
622 {
623 log_error("ssh_connect() error: SSH_ERROR\n");
624 goto cleanup;
625 }
626 }
627 if (ret != SSH_OK)
628 {
629 prints("\033[1;31m连接超时!\033[m\r\n");
630 press_any_key();
631 goto cleanup;
632 }
633
634 ret = ssh_session_is_known_server(session);
635 switch (ret)
636 {
637 case SSH_KNOWN_HOSTS_NOT_FOUND:
638 case SSH_KNOWN_HOSTS_UNKNOWN:
639 if (ssh_session_update_known_hosts(session) != SSH_OK)
640 {
641 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
642 prints("\033[1;31m无法添加服务器证书\033[m\r\n");
643 press_any_key();
644 goto cleanup;
645 }
646 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
647 case SSH_KNOWN_HOSTS_OK:
648 break;
649 case SSH_KNOWN_HOSTS_CHANGED:
650 case SSH_KNOWN_HOSTS_OTHER:
651 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
652 prints("\033[1;31m服务器证书已变更\033[m\r\n");
653 press_any_key();
654 goto cleanup;
655 }
656
657 ret = SSH_AUTH_ERROR;
658 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
659 {
660 ret = ssh_userauth_password(session, NULL, remote_pass);
661 if (ret == SSH_AUTH_SUCCESS)
662 {
663 break;
664 }
665 else if (ret == SSH_AUTH_AGAIN)
666 {
667 // log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
668 }
669 else if (ret == SSH_AUTH_ERROR)
670 {
671 log_error("ssh_userauth_password() error: SSH_AUTH_ERROR\n");
672 goto cleanup;
673 }
674 else // if (ret == SSH_AUTH_DENIED)
675 {
676 log_error("ssh_userauth_password() error: SSH_AUTH_DENIED\n");
677 prints("\033[1;31m身份验证失败!\033[m\r\n");
678 press_any_key();
679 goto cleanup;
680 }
681 }
682 if (ret != SSH_AUTH_SUCCESS)
683 {
684 prints("\033[1;31m连接超时!\033[m\r\n");
685 press_any_key();
686 goto cleanup;
687 }
688
689 channel = ssh_channel_new(session);
690 if (channel == NULL)
691 {
692 log_error("ssh_channel_new() error\n");
693 goto cleanup;
694 }
695
696 ret = SSH_ERROR;
697 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
698 {
699 ret = ssh_channel_open_session(channel);
700 if (ret == SSH_OK)
701 {
702 break;
703 }
704 else if (ret == SSH_AGAIN)
705 {
706 // log_error("ssh_channel_open_session() error: SSH_AGAIN\n");
707 }
708 else // if (ret == SSH_ERROR)
709 {
710 log_error("ssh_channel_open_session() error: SSH_ERROR\n");
711 goto cleanup;
712 }
713 }
714 if (ret != SSH_OK)
715 {
716 prints("\033[1;31m连接超时!\033[m\r\n");
717 press_any_key();
718 goto cleanup;
719 }
720
721 ret = SSH_ERROR;
722 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
723 {
724 ret = ssh_channel_request_pty(channel);
725 if (ret == SSH_OK)
726 {
727 break;
728 }
729 else if (ret == SSH_AGAIN)
730 {
731 // log_error("ssh_channel_request_pty() error: SSH_AGAIN\n");
732 }
733 else // if (ret == SSH_ERROR)
734 {
735 log_error("ssh_channel_request_pty() error: SSH_ERROR\n");
736 goto cleanup;
737 }
738 }
739 if (ret != SSH_OK)
740 {
741 prints("\033[1;31m连接超时!\033[m\r\n");
742 press_any_key();
743 goto cleanup;
744 }
745
746 ret = SSH_ERROR;
747 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
748 {
749 ret = ssh_channel_request_shell(channel);
750 if (ret == SSH_OK)
751 {
752 break;
753 }
754 else if (ret == SSH_AGAIN)
755 {
756 // log_error("ssh_channel_request_shell() error: SSH_AGAIN\n");
757 }
758 else // if (ret == SSH_ERROR)
759 {
760 log_error("ssh_channel_request_shell() error: SSH_ERROR\n");
761 goto cleanup;
762 }
763 }
764 if (ret != SSH_OK)
765 {
766 prints("\033[1;31m连接超时!\033[m\r\n");
767 press_any_key();
768 goto cleanup;
769 }
770 }
771
772 prints("\033[1;31m连接成功!\033[m\r\n");
773 iflush();
774 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
775 remote_addr, remote_port, local_addr, local_port, BBS_username);
776
777 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
778 (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
779 input_cd = iconv_open(tocode, stdio_charset);
780 if (input_cd == (iconv_t)(-1))
781 {
782 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
783 goto cleanup;
784 }
785
786 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
787 (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
788 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
789 if (output_cd == (iconv_t)(-1))
790 {
791 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
792 goto cleanup;
793 }
794
795 #ifdef HAVE_SYS_EPOLL_H
796 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
797 ev.data.fd = sock;
798 if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
799 {
800 log_error("epoll_ctl(socket) error (%d)\n", errno);
801 goto cleanup;
802 }
803
804 ev.events = EPOLLOUT | EPOLLET;
805 ev.data.fd = STDOUT_FILENO;
806 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
807 {
808 log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
809 goto cleanup;
810 }
811 #endif
812
813 BBS_last_access_tm = t_used = time(NULL);
814 loop = 1;
815
816 while (loop && !SYS_server_exit)
817 {
818 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
819 {
820 #ifdef _DEBUG
821 log_error("SSH channel is closed\n");
822 #endif
823 loop = 0;
824 break;
825 }
826
827 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
828 {
829 #ifdef _DEBUG
830 log_error("Remote SSH channel is closed\n");
831 #endif
832 loop = 0;
833 break;
834 }
835
836 #ifdef HAVE_SYS_EPOLL_H
837 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
838 ret = nfds;
839 #else
840 pfds[0].fd = STDIN_FILENO;
841 pfds[0].events = POLLIN;
842 pfds[1].fd = sock;
843 pfds[1].events = POLLIN | POLLOUT;
844 pfds[2].fd = STDOUT_FILENO;
845 pfds[2].events = POLLOUT;
846 nfds = 3;
847 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
848 #endif
849
850 if (ret < 0)
851 {
852 if (errno != EINTR)
853 {
854 #ifdef HAVE_SYS_EPOLL_H
855 log_error("epoll_wait() error (%d)\n", errno);
856 #else
857 log_error("poll() error (%d)\n", errno);
858 #endif
859 break;
860 }
861 continue;
862 }
863 else if (ret == 0) // timeout
864 {
865 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
866 {
867 break;
868 }
869 }
870
871 for (int i = 0; i < nfds; i++)
872 {
873 #ifdef HAVE_SYS_EPOLL_H
874 if (events[i].events & (EPOLLRDHUP | EPOLLHUP | EPOLLERR))
875 #else
876 if (pfds[i].revents & (POLLRDHUP | POLLHUP | POLLERR))
877 #endif
878 {
879 #ifdef _DEBUG
880 #ifdef HAVE_SYS_EPOLL_H
881 log_error("FD (%d) error events (%d)\n", events[i].data.fd, events[i].events);
882 #else
883 log_error("FD (%d) error events (%d)\n", pfds[i].fd, pfds[i].revents);
884 #endif
885 #endif
886 loop = 0;
887 break;
888 }
889
890 #ifdef HAVE_SYS_EPOLL_H
891 if (events[i].data.fd == STDIN_FILENO && (events[i].events & EPOLLIN))
892 #else
893 if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
894 #endif
895 {
896 stdin_read_wait = 1;
897 }
898
899 #ifdef HAVE_SYS_EPOLL_H
900 if (events[i].data.fd == sock)
901 #else
902 if (pfds[i].fd == sock)
903 #endif
904 {
905 #ifdef HAVE_SYS_EPOLL_H
906 if (events[i].events & EPOLLIN)
907 #else
908 if (pfds[i].revents & POLLIN)
909 #endif
910 {
911 sock_read_wait = 1;
912 }
913
914 #ifdef HAVE_SYS_EPOLL_H
915 if (events[i].events & EPOLLOUT)
916 #else
917 if (pfds[i].revents & POLLOUT)
918 #endif
919 {
920 sock_write_wait = 1;
921 }
922 }
923
924 #ifdef HAVE_SYS_EPOLL_H
925 if (events[i].data.fd == STDOUT_FILENO && (events[i].events & EPOLLOUT))
926 #else
927 if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
928 #endif
929 {
930 stdout_write_wait = 1;
931 }
932 }
933
934 if (stdin_read_wait)
935 {
936 while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
937 {
938 if (SSH_v2)
939 {
940 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
941 if (ret == SSH_ERROR)
942 {
943 #ifdef _DEBUG
944 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
945 #endif
946 loop = 0;
947 break;
948 }
949 else if (ret == SSH_EOF)
950 {
951 stdin_read_wait = 0;
952 loop = 0;
953 break;
954 }
955 else if (ret == 0)
956 {
957 // Send NO-OP to remote server
958 input_buf[input_buf_len] = '\0';
959 input_buf_len++;
960 BBS_last_access_tm = time(NULL);
961
962 stdin_read_wait = 0;
963 break; // Check whether channel is still open
964 }
965 }
966 else
967 {
968 ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
969 }
970 if (ret < 0)
971 {
972 if (errno == EAGAIN || errno == EWOULDBLOCK)
973 {
974 stdin_read_wait = 0;
975 break;
976 }
977 else if (errno == EINTR)
978 {
979 continue;
980 }
981 else
982 {
983 log_error("read(STDIN) error (%d)\n", errno);
984 loop = 0;
985 break;
986 }
987 }
988 else if (ret == 0) // broken pipe
989 {
990 #ifdef _DEBUG
991 log_error("read(STDIN) EOF\n");
992 #endif
993 stdin_read_wait = 0;
994 loop = 0;
995 break;
996 }
997 else
998 {
999 input_buf_len += ret;
1000 BBS_last_access_tm = time(NULL);
1001
1002 // Refresh current action while user input
1003 if (user_online_update("BBS_NET") < 0)
1004 {
1005 log_error("user_online_update(BBS_NET) error\n");
1006 }
1007
1008 continue;
1009 }
1010 }
1011 }
1012
1013 if (sock_write_wait)
1014 {
1015 if (input_buf_offset < input_buf_len)
1016 {
1017 // For debug
1018 #ifdef _DEBUG
1019 for (int j = input_buf_offset; j < input_buf_len; j++)
1020 {
1021 log_error("Debug input: <--[%u]\n", (input_buf[j] + 256) % 256);
1022 }
1023 #endif
1024
1025 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
1026 if (ret < 0)
1027 {
1028 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
1029 input_buf_len = input_buf_offset; // Discard invalid sequence
1030 }
1031
1032 // For debug
1033 #ifdef _DEBUG
1034 for (int j = input_conv_offset; j < input_conv_len; j++)
1035 {
1036 log_error("Debug input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
1037 }
1038 #endif
1039 }
1040
1041 while (input_conv_offset < input_conv_len && !SYS_server_exit)
1042 {
1043 if (bbsnet_conf[n].use_ssh)
1044 {
1045 ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
1046 if (ret == SSH_ERROR)
1047 {
1048 #ifdef _DEBUG
1049 log_error("ssh_channel_write() error: %s\n", ssh_get_error(session));
1050 #endif
1051 loop = 0;
1052 break;
1053 }
1054 }
1055 else
1056 {
1057 ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
1058 }
1059 if (ret < 0)
1060 {
1061 if (errno == EAGAIN || errno == EWOULDBLOCK)
1062 {
1063 sock_write_wait = 0;
1064 break;
1065 }
1066 else if (errno == EINTR)
1067 {
1068 continue;
1069 }
1070 else
1071 {
1072 #ifdef _DEBUG
1073 log_error("write(socket) error (%d)\n", errno);
1074 #endif
1075 loop = 0;
1076 break;
1077 }
1078 }
1079 else if (ret == 0) // broken pipe
1080 {
1081 #ifdef _DEBUG
1082 log_error("write(socket) EOF\n");
1083 #endif
1084 sock_write_wait = 0;
1085 loop = 0;
1086 break;
1087 }
1088 else
1089 {
1090 input_conv_offset += ret;
1091 if (input_conv_offset >= input_conv_len) // Output buffer complete
1092 {
1093 input_conv_offset = 0;
1094 input_conv_len = 0;
1095 break;
1096 }
1097 continue;
1098 }
1099 }
1100 }
1101
1102 if (sock_read_wait)
1103 {
1104 while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1105 {
1106 if (bbsnet_conf[n].use_ssh)
1107 {
1108 ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
1109 (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1110 if (ret == SSH_ERROR)
1111 {
1112 #ifdef _DEBUG
1113 log_error("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
1114 #endif
1115 loop = 0;
1116 break;
1117 }
1118 else if (ret == SSH_EOF)
1119 {
1120 sock_read_wait = 0;
1121 loop = 0;
1122 break;
1123 }
1124 else if (ret == 0)
1125 {
1126 sock_read_wait = 0;
1127 break;
1128 }
1129 }
1130 else
1131 {
1132 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1133 }
1134 if (ret < 0)
1135 {
1136 if (errno == EAGAIN || errno == EWOULDBLOCK)
1137 {
1138 sock_read_wait = 0;
1139 break;
1140 }
1141 else if (errno == EINTR)
1142 {
1143 continue;
1144 }
1145 else
1146 {
1147 #ifdef _DEBUG
1148 log_error("read(socket) error (%d)\n", errno);
1149 #endif
1150 loop = 0;
1151 break;
1152 }
1153 }
1154 else if (ret == 0) // broken pipe
1155 {
1156 #ifdef _DEBUG
1157 log_error("read(socket) EOF\n");
1158 #endif
1159 sock_read_wait = 0;
1160 loop = 0;
1161 break;
1162 }
1163 else
1164 {
1165 output_buf_len += ret;
1166 continue;
1167 }
1168 }
1169 }
1170
1171 if (stdout_write_wait)
1172 {
1173 if (output_buf_offset < output_buf_len)
1174 {
1175 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1176 if (ret < 0)
1177 {
1178 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1179 output_buf_len = output_buf_offset; // Discard invalid sequence
1180 }
1181 }
1182
1183 while (output_conv_offset < output_conv_len && !SYS_server_exit)
1184 {
1185 if (SSH_v2)
1186 {
1187 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1188 if (ret == SSH_ERROR)
1189 {
1190 #ifdef _DEBUG
1191 log_error("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1192 #endif
1193 loop = 0;
1194 break;
1195 }
1196 }
1197 else
1198 {
1199 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1200 }
1201 if (ret < 0)
1202 {
1203 if (errno == EAGAIN || errno == EWOULDBLOCK)
1204 {
1205 stdout_write_wait = 0;
1206 break;
1207 }
1208 else if (errno == EINTR)
1209 {
1210 continue;
1211 }
1212 else
1213 {
1214 #ifdef _DEBUG
1215 log_error("write(STDOUT) error (%d)\n", errno);
1216 #endif
1217 loop = 0;
1218 break;
1219 }
1220 }
1221 else if (ret == 0) // broken pipe
1222 {
1223 #ifdef _DEBUG
1224 log_error("write(STDOUT) EOF\n");
1225 #endif
1226 stdout_write_wait = 0;
1227 loop = 0;
1228 break;
1229 }
1230 else
1231 {
1232 output_conv_offset += ret;
1233 if (output_conv_offset >= output_conv_len) // Output buffer complete
1234 {
1235 output_conv_offset = 0;
1236 output_conv_len = 0;
1237 break;
1238 }
1239 continue;
1240 }
1241 }
1242 }
1243 }
1244
1245 cleanup:
1246 if (input_cd != (iconv_t)(-1))
1247 {
1248 iconv_close(input_cd);
1249 }
1250 if (output_cd != (iconv_t)(-1))
1251 {
1252 iconv_close(output_cd);
1253 }
1254
1255 #ifdef HAVE_SYS_EPOLL_H
1256 if (epollfd != -1 && close(epollfd) < 0)
1257 {
1258 log_error("close(epoll) error (%d)\n");
1259 }
1260 #endif
1261
1262 if (bbsnet_conf[n].use_ssh)
1263 {
1264 if (channel != NULL)
1265 {
1266 ssh_channel_free(channel);
1267 }
1268 if (session != NULL)
1269 {
1270 ssh_disconnect(session);
1271 ssh_free(session);
1272 }
1273 }
1274
1275 // Restore STDIN/STDOUT flags
1276 if (flags_stdin != -1 && fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1277 {
1278 log_error("fcntl(F_SETFL) error (%d)\n", errno);
1279 }
1280 if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1281 {
1282 log_error("fcntl(F_SETFL) error (%d)\n", errno);
1283 }
1284
1285 if (sock != -1 && close(sock) == -1)
1286 {
1287 log_error("Close socket failed\n");
1288 }
1289
1290 if (res)
1291 {
1292 freeaddrinfo(res);
1293 }
1294
1295 t_used = time(NULL) - t_used;
1296 tm_used = gmtime(&t_used);
1297
1298 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1299 tm_used->tm_yday, tm_used->tm_hour, tm_used->tm_min, tm_used->tm_sec);
1300
1301 BBS_last_access_tm = time(NULL);
1302
1303 return 0;
1304 }
1305
1306 static int bbsnet_refresh()
1307 {
1308 clearscr();
1309
1310 moveto(1, 1);
1311 prints(" ------------------------------------------------------------------------------ ");
1312 for (int i = 2; i < 19; i++)
1313 {
1314 moveto(i, 1);
1315 prints("|");
1316 moveto(i, 80);
1317 prints("|");
1318 }
1319 moveto(19, 1);
1320 prints("|------------------------------------------------------------------------------|");
1321 moveto(22, 1);
1322 prints(" ------------------------------------------------------------------------------ ");
1323 moveto(23, 1);
1324 prints(" [\033[1;32mCtrl+C\033[m]退出");
1325
1326 iflush();
1327
1328 return 0;
1329 }
1330
1331 static int bbsnet_selchange()
1332 {
1333 int i = bbsnet_menu.menu_item_pos[0];
1334
1335 moveto(20, 1);
1336 clrtoeol();
1337 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1338 bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1339 bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1340 (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1341 moveto(20, 80);
1342 prints("|");
1343 moveto(21, 1);
1344 clrtoeol();
1345 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5s\033[m 编码: \033[1;33m%s\033[m",
1346 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1347 moveto(21, 80);
1348 prints("|");
1349 iflush();
1350
1351 return 0;
1352 }
1353
1354 int bbs_net()
1355 {
1356 int ch, i;
1357
1358 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1359 {
1360 clearscr();
1361 moveto(1, 1);
1362 prints("加载穿梭配置失败!");
1363 press_any_key();
1364 return -1;
1365 }
1366
1367 bbsnet_refresh();
1368 display_menu(&bbsnet_menu);
1369 bbsnet_selchange();
1370
1371 while (!SYS_server_exit)
1372 {
1373 ch = igetch(100);
1374
1375 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1376 {
1377 BBS_last_access_tm = time(NULL);
1378 }
1379
1380 switch (ch)
1381 {
1382 case KEY_NULL: // broken pipe
1383 #ifdef _DEBUG
1384 log_error("KEY_NULL\n");
1385 #endif
1386 goto cleanup;
1387 case KEY_TIMEOUT:
1388 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1389 {
1390 log_error("User input timeout\n");
1391 goto cleanup;
1392 }
1393 continue;
1394 case KEY_ESC:
1395 case Ctrl('C'): // user cancel
1396 goto cleanup;
1397 case CR:
1398 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1399 // Force cleanup anything remaining in the output buffer
1400 clearscr();
1401 iflush();
1402 // Clear screen and redraw menu
1403 bbsnet_refresh();
1404 display_menu(&bbsnet_menu);
1405 bbsnet_selchange();
1406 break;
1407 case KEY_UP:
1408 for (i = 0; i < STATION_PER_LINE; i++)
1409 {
1410 menu_control(&bbsnet_menu, KEY_UP);
1411 }
1412 bbsnet_selchange();
1413 break;
1414 case KEY_DOWN:
1415 for (i = 0; i < STATION_PER_LINE; i++)
1416 {
1417 menu_control(&bbsnet_menu, KEY_DOWN);
1418 }
1419 bbsnet_selchange();
1420 break;
1421 case KEY_LEFT:
1422 menu_control(&bbsnet_menu, KEY_UP);
1423 bbsnet_selchange();
1424 break;
1425 case KEY_RIGHT:
1426 menu_control(&bbsnet_menu, KEY_DOWN);
1427 bbsnet_selchange();
1428 break;
1429 case KEY_HOME:
1430 case KEY_PGUP:
1431 menu_control(&bbsnet_menu, KEY_PGUP);
1432 bbsnet_selchange();
1433 break;
1434 case KEY_END:
1435 case KEY_PGDN:
1436 menu_control(&bbsnet_menu, KEY_PGDN);
1437 bbsnet_selchange();
1438 break;
1439 default:
1440 menu_control(&bbsnet_menu, ch);
1441 bbsnet_selchange();
1442 break;
1443 }
1444 }
1445
1446 cleanup:
1447 unload_bbsnet_conf();
1448
1449 return 0;
1450 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1