/[LeafOK_CVS]/lbbs/src/bbs_net.c
ViewVC logotype

Contents of /lbbs/src/bbs_net.c

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.96 - (show annotations)
Thu Dec 18 03:23:48 2025 UTC (2 months, 4 weeks ago) by sysadm
Branch: MAIN
Changes since 1.95: +2 -2 lines
Content type: text/x-csrc
Do not monitor EPOLLRDHUP / POLLRDHUP, since POLLRDHUP is not supported by MSYS2.

1 /* SPDX-License-Identifier: GPL-3.0-or-later */
2 /*
3 * bbs_net
4 * - user interactive feature of site shuttle
5 *
6 * Copyright (C) 2004-2025 Leaflet <leaflet@leafok.com>
7 */
8
9 #ifdef HAVE_CONFIG_H
10 #include "config.h"
11 #endif
12
13 #include "bbs.h"
14 #include "bbs_net.h"
15 #include "common.h"
16 #include "io.h"
17 #include "log.h"
18 #include "login.h"
19 #include "menu.h"
20 #include "screen.h"
21 #include "str_process.h"
22 #include <errno.h>
23 #include <fcntl.h>
24 #include <netdb.h>
25 #include <stdarg.h>
26 #include <stdio.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <time.h>
30 #include <unistd.h>
31 #include <arpa/inet.h>
32 #include <ctype.h>
33 #include <libssh/libssh.h>
34 #include <libssh/server.h>
35 #include <libssh/callbacks.h>
36 #include <netinet/in.h>
37 #include <netinet/ip.h>
38 #include <sys/select.h>
39 #include <sys/ioctl.h>
40 #include <sys/socket.h>
41
42 #ifdef HAVE_SYS_EPOLL_H
43 #include <sys/epoll.h>
44 #else
45 #include <poll.h>
46 #endif
47
48 static const char MENU_CONF_DELIM[] = " \t\r\n";
49
50 enum _bbs_net_constant_t
51 {
52 MAX_PROCESS_BAR_LEN = 30,
53 MAXSTATION = 26 * 2,
54 STATION_PER_LINE = 4,
55 USERNAME_MAX_LEN = 20,
56 PASSWORD_MAX_LEN = 20,
57 SSH_CONNECT_TIMEOUT = 5, // seconds
58 };
59
60 struct _bbsnet_conf
61 {
62 char org_name[40];
63 char site_name[40];
64 char host_name[IP_ADDR_LEN];
65 char port[6];
66 int8_t use_ssh;
67 char charset[CHARSET_MAX_LEN + 1];
68 } bbsnet_conf[MAXSTATION];
69
70 static MENU_SET bbsnet_menu;
71
72 static void unload_bbsnet_conf(void);
73
74 static int load_bbsnet_conf(const char *file_config)
75 {
76 FILE *fp;
77 MENU *p_menu;
78 MENU_ITEM *p_menu_item;
79 MENU_ITEM_ID menu_item_id;
80 char line[LINE_BUFFER_LEN], *t1, *t2, *t3, *t4, *t5, *t6, *saveptr;
81 int port;
82
83 unload_bbsnet_conf();
84
85 bbsnet_menu.p_menu_pool = calloc(1, sizeof(MENU));
86 if (bbsnet_menu.p_menu_pool == NULL)
87 {
88 log_error("calloc(p_menu_pool) error\n");
89 return -1;
90 }
91 bbsnet_menu.menu_count = 1;
92
93 bbsnet_menu.p_menu_item_pool = calloc(MAXSTATION, sizeof(MENU_ITEM));
94 if (bbsnet_menu.p_menu_item_pool == NULL)
95 {
96 log_error("calloc(p_menu_item_pool) error\n");
97 unload_bbsnet_conf();
98 return -1;
99 }
100 bbsnet_menu.menu_item_count = MAXSTATION;
101
102 p_menu = (MENU *)get_menu_by_id(&bbsnet_menu, 0);
103
104 strncpy(p_menu->name, "BBSNET", sizeof(p_menu->name) - 1);
105 p_menu->name[sizeof(p_menu->name) - 1] = '\0';
106 p_menu->title.show = 0;
107 p_menu->screen_show = 0;
108
109 fp = fopen(file_config, "r");
110 if (fp == NULL)
111 {
112 unload_bbsnet_conf();
113 return -2;
114 }
115
116 menu_item_id = 0;
117 while (fgets(line, sizeof(line), fp) && menu_item_id < MAXSTATION)
118 {
119 t1 = strtok_r(line, MENU_CONF_DELIM, &saveptr);
120 t2 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
121 t3 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
122 t4 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
123 t5 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
124 t6 = strtok_r(NULL, MENU_CONF_DELIM, &saveptr);
125
126 if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL ||
127 t5 == NULL || t6 == NULL || line[0] == '#' || line[0] == '*')
128 {
129 continue;
130 }
131
132 strncpy(bbsnet_conf[menu_item_id].site_name, t2, sizeof(bbsnet_conf[menu_item_id].site_name) - 1);
133 bbsnet_conf[menu_item_id].site_name[sizeof(bbsnet_conf[menu_item_id].site_name) - 1] = '\0';
134 strncpy(bbsnet_conf[menu_item_id].org_name, t1, sizeof(bbsnet_conf[menu_item_id].org_name) - 1);
135 bbsnet_conf[menu_item_id].org_name[sizeof(bbsnet_conf[menu_item_id].org_name) - 1] = '\0';
136 strncpy(bbsnet_conf[menu_item_id].host_name, t3, sizeof(bbsnet_conf[menu_item_id].host_name) - 1);
137 bbsnet_conf[menu_item_id].host_name[sizeof(bbsnet_conf[menu_item_id].host_name) - 1] = '\0';
138 port = atoi(t4);
139 if (port <= 0 || port > 65535)
140 {
141 log_error("Invalid port value %d of menu item %d\n", port, menu_item_id);
142 fclose(fp);
143 unload_bbsnet_conf();
144 return -3;
145 }
146 strncpy(bbsnet_conf[menu_item_id].port, t4, sizeof(bbsnet_conf[menu_item_id].port) - 1);
147 bbsnet_conf[menu_item_id].port[sizeof(bbsnet_conf[menu_item_id].port) - 1] = '\0';
148 bbsnet_conf[menu_item_id].use_ssh = (toupper(t5[0]) == 'Y');
149 strncpy(bbsnet_conf[menu_item_id].charset, t6, sizeof(bbsnet_conf[menu_item_id].charset) - 1);
150 bbsnet_conf[menu_item_id].charset[sizeof(bbsnet_conf[menu_item_id].charset) - 1] = '\0';
151
152 p_menu_item = get_menu_item_by_id(&bbsnet_menu, menu_item_id);
153 if (p_menu_item == NULL)
154 {
155 log_error("get_menu_item_by_id(%d) return NULL pointer\n", menu_item_id);
156 fclose(fp);
157 unload_bbsnet_conf();
158 return -3;
159 }
160
161 p_menu_item->row = (int16_t)(2 + menu_item_id / STATION_PER_LINE);
162 p_menu_item->col = (int16_t)(5 + menu_item_id % STATION_PER_LINE * 20);
163 snprintf(p_menu_item->action, sizeof(p_menu_item->action), "%d", (int16_t)menu_item_id);
164 p_menu_item->submenu = 0;
165 p_menu_item->priv = 0;
166 p_menu_item->level = 0;
167 p_menu_item->name[0] =
168 (char)(menu_item_id < MAXSTATION / 2 ? 'A' + menu_item_id : 'a' + menu_item_id);
169 p_menu_item->name[1] = '\0';
170 snprintf(p_menu_item->text, sizeof(p_menu_item->text), "\033[1;36m%c.\033[m %s",
171 p_menu_item->name[0], bbsnet_conf[menu_item_id].site_name);
172
173 p_menu->items[p_menu->item_count] = menu_item_id;
174 p_menu->item_count++;
175 menu_item_id++;
176 }
177
178 bbsnet_menu.menu_item_count = (int16_t)menu_item_id;
179 bbsnet_menu.menu_id_path[0] = 0;
180 bbsnet_menu.menu_item_pos[0] = 0;
181 bbsnet_menu.choose_step = 0;
182
183 fclose(fp);
184
185 return 0;
186 }
187
188 static void unload_bbsnet_conf(void)
189 {
190 bbsnet_menu.menu_count = 0;
191 bbsnet_menu.menu_item_count = 0;
192
193 if (bbsnet_menu.p_menu_pool)
194 {
195 free(bbsnet_menu.p_menu_pool);
196 bbsnet_menu.p_menu_pool = NULL;
197 }
198
199 if (bbsnet_menu.p_menu_item_pool)
200 {
201 free(bbsnet_menu.p_menu_item_pool);
202 bbsnet_menu.p_menu_item_pool = NULL;
203 }
204 }
205
206 static void process_bar(int n, int len)
207 {
208 char buf[LINE_BUFFER_LEN];
209 char buf2[LINE_BUFFER_LEN];
210
211 if (len <= 0)
212 {
213 len = 1;
214 }
215 else if (len > LINE_BUFFER_LEN)
216 {
217 len = LINE_BUFFER_LEN - 1;
218 }
219 if (n < 0)
220 {
221 n = 0;
222 }
223 else if (n > len)
224 {
225 n = len;
226 }
227
228 moveto(4, 1);
229 prints(" ------------------------------ \r\n");
230 snprintf(buf, sizeof(buf), " %3d%% ", n * 100 / len);
231 memcpy(buf2, buf, (size_t)n);
232 buf2[n] = '\0';
233 prints("|\033[46m%s\033[44m%s\033[m|\r\n", buf2, buf + n);
234 prints(" ------------------------------ \r\n");
235 iflush();
236 }
237
238 static int bbsnet_connect(int n)
239 {
240 int sock = -1;
241 int ret;
242 int loop;
243 int error;
244 int sock_connected = 0;
245 int flags_sock = -1;
246 int flags_stdin = -1;
247 int flags_stdout = -1;
248 struct sockaddr_in sin;
249 char input_buf[LINE_BUFFER_LEN];
250 char output_buf[LINE_BUFFER_LEN];
251 int input_buf_len = 0;
252 int output_buf_len = 0;
253 int input_buf_offset = 0;
254 int output_buf_offset = 0;
255 char input_conv[LINE_BUFFER_LEN * 2];
256 char output_conv[LINE_BUFFER_LEN * 2];
257 int input_conv_len = 0;
258 int output_conv_len = 0;
259 int input_conv_offset = 0;
260 int output_conv_offset = 0;
261 iconv_t input_cd = (iconv_t)(-1);
262 iconv_t output_cd = (iconv_t)(-1);
263 char tocode[CHARSET_MAX_LEN + 20];
264
265 #ifdef HAVE_SYS_EPOLL_H
266 struct epoll_event ev, events[MAX_EVENTS];
267 int epollfd = -1;
268 #else
269 struct pollfd pfds[3];
270 #endif
271
272 int nfds;
273 int stdin_read_wait = 0;
274 int stdout_write_wait = 0;
275 int sock_read_wait = 0;
276 int sock_write_wait = 0;
277 struct addrinfo hints, *res = NULL;
278 int tos;
279 char remote_addr[INET_ADDRSTRLEN];
280 int remote_port;
281 char local_addr[INET_ADDRSTRLEN];
282 int local_port;
283 socklen_t sock_len;
284 time_t t_begin;
285 time_t t_used = time(NULL);
286 struct tm *tm_used;
287 int ch;
288 char remote_user[USERNAME_MAX_LEN + 1];
289 char remote_pass[PASSWORD_MAX_LEN + 1];
290 ssh_session session = NULL;
291 ssh_channel channel = NULL;
292 int ssh_process_config = 0;
293 int ssh_log_level = SSH_LOG_NOLOG;
294
295 if (user_online_update("BBS_NET") < 0)
296 {
297 log_error("user_online_update(BBS_NET) error\n");
298 }
299
300 if (bbsnet_conf[n].use_ssh)
301 {
302 clearscr();
303
304 if (!SSH_v2)
305 {
306 moveto(1, 1);
307 prints("只有在以SSH方式登陆本站时,才能使用SSH站点穿梭。");
308 press_any_key();
309 return 0;
310 }
311
312 moveto(1, 1);
313 prints("通过SSH方式连接[%s]...", bbsnet_conf[n].site_name);
314 moveto(2, 1);
315 prints("请输入用户名: ");
316 iflush();
317 if (str_input(remote_user, sizeof(remote_user), DOECHO) < 0)
318 {
319 return -1;
320 }
321 if (remote_user[0] == '\0')
322 {
323 return 0;
324 }
325
326 moveto(3, 1);
327 prints("请输入密码: ");
328 iflush();
329 if (str_input(remote_pass, sizeof(remote_pass), NOECHO) < 0)
330 {
331 return -1;
332 }
333 if (remote_pass[0] == '\0')
334 {
335 return 0;
336 }
337 }
338
339 clearscr();
340
341 moveto(1, 1);
342 prints("\033[1;32m正在测试往 %s (%s) 的连接,请稍候... \033[m\r\n",
343 bbsnet_conf[n].site_name, bbsnet_conf[n].host_name);
344 iflush();
345
346 memset(&hints, 0, sizeof(hints));
347 hints.ai_family = AF_INET;
348 hints.ai_socktype = SOCK_STREAM;
349 hints.ai_protocol = IPPROTO_TCP;
350
351 if ((ret = getaddrinfo(BBS_address, NULL, &hints, &res)) != 0)
352 {
353 log_error("getaddrinfo() error (%d)\n", ret);
354 goto cleanup;
355 }
356
357 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr), local_addr, sizeof(local_addr)) == NULL)
358 {
359 log_error("inet_ntop() error (%d)\n", errno);
360 goto cleanup;
361 }
362 local_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
363
364 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
365 if (sock < 0)
366 {
367 log_error("socket() error (%d)\n", errno);
368 goto cleanup;
369 }
370
371 if (bind(sock, res->ai_addr, res->ai_addrlen) < 0)
372 {
373 log_error("bind(%s:%u) error (%d)\n", local_addr, local_port, errno);
374 goto cleanup;
375 }
376
377 freeaddrinfo(res);
378 res = NULL;
379
380 memset(&hints, 0, sizeof(hints));
381 hints.ai_family = AF_INET;
382 hints.ai_flags = AI_NUMERICSERV;
383 hints.ai_socktype = SOCK_STREAM;
384 hints.ai_protocol = IPPROTO_TCP;
385
386 if ((ret = getaddrinfo(bbsnet_conf[n].host_name, bbsnet_conf[n].port, &hints, &res)) != 0)
387 {
388 log_error("getaddrinfo() error (%d)\n", ret);
389 prints("\033[1;31m查找主机名失败!\033[m\r\n");
390 press_any_key();
391 goto cleanup;
392 }
393
394 if (inet_ntop(AF_INET, &(((struct sockaddr_in *)res->ai_addr)->sin_addr.s_addr), remote_addr, sizeof(remote_addr)) == NULL)
395 {
396 log_error("inet_ntop() error (%d)\n", errno);
397 goto cleanup;
398 }
399 remote_port = ntohs(((struct sockaddr_in *)res->ai_addr)->sin_port);
400
401 prints("\033[1;32m穿梭进度条提示您当前已使用的时间,按\033[1;33mCtrl+C\033[1;32m中断。\033[m\r\n");
402 process_bar(0, MAX_PROCESS_BAR_LEN);
403
404 // Set socket as non-blocking
405 if ((flags_sock = fcntl(sock, F_GETFL, 0)) == -1)
406 {
407 log_error("fcntl(F_GETFL) error (%d)\n", errno);
408 goto cleanup;
409 }
410 if ((fcntl(sock, F_SETFL, flags_sock | O_NONBLOCK)) == -1)
411 {
412 log_error("fcntl(F_SETFL) error (%d)\n", errno);
413 goto cleanup;
414 }
415
416 // Set STDIN/STDOUT as non-blocking
417 if ((flags_stdin = fcntl(STDIN_FILENO, F_GETFL, 0)) == -1)
418 {
419 log_error("fcntl(F_GETFL) error (%d)\n", errno);
420 goto cleanup;
421 }
422 if ((flags_stdout = fcntl(STDOUT_FILENO, F_GETFL, 0)) == -1)
423 {
424 log_error("fcntl(F_GETFL) error (%d)\n", errno);
425 goto cleanup;
426 }
427 if ((fcntl(STDIN_FILENO, F_SETFL, flags_stdin | O_NONBLOCK)) == -1)
428 {
429 log_error("fcntl(F_SETFL) error (%d)\n", errno);
430 goto cleanup;
431 }
432 if ((fcntl(STDOUT_FILENO, F_SETFL, flags_stdout | O_NONBLOCK)) == -1)
433 {
434 log_error("fcntl(F_SETFL) error (%d)\n", errno);
435 goto cleanup;
436 }
437
438 #ifdef HAVE_SYS_EPOLL_H
439 epollfd = epoll_create1(0);
440 if (epollfd < 0)
441 {
442 log_error("epoll_create1() error (%d)\n", errno);
443 goto cleanup;
444 }
445
446 ev.events = EPOLLOUT | EPOLLET;
447 ev.data.fd = sock;
448 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, sock, &ev) == -1)
449 {
450 log_error("epoll_ctl(socket) error (%d)\n", errno);
451 goto cleanup;
452 }
453
454 ev.events = EPOLLIN | EPOLLET;
455 ev.data.fd = STDIN_FILENO;
456 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDIN_FILENO, &ev) == -1)
457 {
458 log_error("epoll_ctl(STDIN_FILENO) error (%d)\n", errno);
459 goto cleanup;
460 }
461 #endif
462
463 while (!SYS_server_exit)
464 {
465 if ((ret = connect(sock, res->ai_addr, res->ai_addrlen)) < 0)
466 {
467 if (errno == EAGAIN || errno == EALREADY || errno == EINPROGRESS)
468 {
469 // Use select / epoll to check writability of the socket,
470 // then use getsockopt to check the status of the socket.
471 // See man connect(2)
472 break;
473 }
474 else if (errno == EINTR)
475 {
476 continue;
477 }
478 else
479 {
480 log_error("connect(socket) error (%d)\n", errno);
481 prints("\033[1;31m连接失败!\033[m\r\n");
482 press_any_key();
483 goto cleanup;
484 }
485 }
486 }
487
488 for (int j = 0; j < MAX_PROCESS_BAR_LEN && !sock_connected && !SYS_server_exit; j++)
489 {
490 #ifdef HAVE_SYS_EPOLL_H
491 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 500); // 0.5 second
492 ret = nfds;
493 #else
494 pfds[0].fd = sock;
495 pfds[0].events = POLLOUT;
496 pfds[1].fd = STDIN_FILENO;
497 pfds[1].events = POLLIN;
498 nfds = 2;
499 ret = poll(pfds, (nfds_t)nfds, 500); // 0.5 second
500 #endif
501
502 if (ret < 0)
503 {
504 if (errno != EINTR)
505 {
506 #ifdef HAVE_SYS_EPOLL_H
507 log_error("epoll_wait() error (%d)\n", errno);
508 #else
509 log_error("poll() error (%d)\n", errno);
510 #endif
511 break;
512 }
513 }
514 else if (ret == 0) // timeout
515 {
516 process_bar(j + 1, MAX_PROCESS_BAR_LEN);
517 }
518 else // ret > 0
519 {
520 for (int i = 0; i < nfds; i++)
521 {
522 #ifdef HAVE_SYS_EPOLL_H
523 if (events[i].data.fd == sock)
524 #else
525 if (pfds[i].fd == sock && (pfds[i].revents & POLLOUT))
526 #endif
527 {
528 socklen_t len = sizeof(error);
529 if (getsockopt(sock, SOL_SOCKET, SO_ERROR, &error, &len) < 0)
530 {
531 log_error("getsockopt() error (%d) !\n", errno);
532 goto cleanup;
533 }
534 if (error == 0)
535 {
536 sock_connected = 1;
537 }
538 }
539 #ifdef HAVE_SYS_EPOLL_H
540 else if (events[i].data.fd == STDIN_FILENO)
541 #else
542 else if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
543 #endif
544 {
545 do
546 {
547 ch = igetch(0);
548 } while (ch == 0);
549 if (ch == Ctrl('C') || ch == KEY_ESC)
550 {
551 goto cleanup;
552 }
553 }
554 }
555 }
556 }
557 if (SYS_server_exit)
558 {
559 goto cleanup;
560 }
561 if (!sock_connected)
562 {
563 prints("\033[1;31m连接失败!\033[m\r\n");
564 press_any_key();
565 goto cleanup;
566 }
567
568 tos = IPTOS_LOWDELAY;
569 if (setsockopt(sock, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
570 {
571 log_error("setsockopt IP_TOS=%d error (%d)\n", tos, errno);
572 }
573
574 sock_len = sizeof(sin);
575 if (getsockname(sock, (struct sockaddr *)&sin, &sock_len) < 0)
576 {
577 log_error("getsockname() error: %d", errno);
578 goto cleanup;
579 }
580
581 strncpy(local_addr, inet_ntoa(sin.sin_addr), sizeof(local_addr) - 1);
582 local_addr[sizeof(local_addr) - 1] = '\0';
583 local_port = ntohs(sin.sin_port);
584
585 if (bbsnet_conf[n].use_ssh)
586 {
587 session = ssh_new();
588 if (session == NULL)
589 {
590 log_error("ssh_new() error\n");
591 goto cleanup;
592 }
593
594 if (ssh_options_set(session, SSH_OPTIONS_FD, &sock) < 0 ||
595 ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &ssh_process_config) < 0 ||
596 ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, SSH_KNOWN_HOSTS_FILE) < 0 ||
597 ssh_options_set(session, SSH_OPTIONS_HOST, bbsnet_conf[n].host_name) < 0 ||
598 ssh_options_set(session, SSH_OPTIONS_USER, remote_user) < 0 ||
599 ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "+ssh-rsa") < 0 ||
600 ssh_options_set(session, SSH_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
601 {
602 log_error("Error setting SSH options: %s\n", ssh_get_error(session));
603 goto cleanup;
604 }
605
606 ssh_set_blocking(session, 0);
607
608 t_begin = time(NULL);
609 ret = SSH_ERROR;
610 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
611 {
612 ret = ssh_connect(session);
613 if (ret == SSH_OK)
614 {
615 break;
616 }
617 else if (ret == SSH_AGAIN)
618 {
619 // log_error("ssh_connect() error: SSH_AGAIN\n");
620 }
621 else // if (ret == SSH_ERROR)
622 {
623 log_error("ssh_connect() error: SSH_ERROR\n");
624 goto cleanup;
625 }
626 }
627 if (ret != SSH_OK)
628 {
629 prints("\033[1;31m连接超时!\033[m\r\n");
630 press_any_key();
631 goto cleanup;
632 }
633
634 ret = ssh_session_is_known_server(session);
635 switch (ret)
636 {
637 case SSH_KNOWN_HOSTS_NOT_FOUND:
638 case SSH_KNOWN_HOSTS_UNKNOWN:
639 if (ssh_session_update_known_hosts(session) != SSH_OK)
640 {
641 log_error("ssh_session_update_known_hosts(%s) error\n", bbsnet_conf[n].host_name);
642 prints("\033[1;31m无法添加服务器证书\033[m\r\n");
643 press_any_key();
644 goto cleanup;
645 }
646 log_common("SSH key of (%s) is added into %s\n", bbsnet_conf[n].host_name, SSH_KNOWN_HOSTS_FILE);
647 case SSH_KNOWN_HOSTS_OK:
648 break;
649 case SSH_KNOWN_HOSTS_CHANGED:
650 case SSH_KNOWN_HOSTS_OTHER:
651 log_error("ssh_session_is_known_server(%s) error: %d\n", bbsnet_conf[n].host_name, ret);
652 prints("\033[1;31m服务器证书已变更\033[m\r\n");
653 press_any_key();
654 goto cleanup;
655 }
656
657 ret = SSH_AUTH_ERROR;
658 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
659 {
660 ret = ssh_userauth_password(session, NULL, remote_pass);
661 if (ret == SSH_AUTH_SUCCESS)
662 {
663 break;
664 }
665 else if (ret == SSH_AUTH_AGAIN)
666 {
667 // log_error("ssh_userauth_password() error: SSH_AUTH_AGAIN\n");
668 }
669 else if (ret == SSH_AUTH_ERROR)
670 {
671 log_error("ssh_userauth_password() error: SSH_AUTH_ERROR\n");
672 goto cleanup;
673 }
674 else // if (ret == SSH_AUTH_DENIED)
675 {
676 log_error("ssh_userauth_password() error: SSH_AUTH_DENIED\n");
677 prints("\033[1;31m身份验证失败!\033[m\r\n");
678 press_any_key();
679 goto cleanup;
680 }
681 }
682 if (ret != SSH_AUTH_SUCCESS)
683 {
684 prints("\033[1;31m连接超时!\033[m\r\n");
685 press_any_key();
686 goto cleanup;
687 }
688
689 channel = ssh_channel_new(session);
690 if (channel == NULL)
691 {
692 log_error("ssh_channel_new() error\n");
693 goto cleanup;
694 }
695
696 ret = SSH_ERROR;
697 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
698 {
699 ret = ssh_channel_open_session(channel);
700 if (ret == SSH_OK)
701 {
702 break;
703 }
704 else if (ret == SSH_AGAIN)
705 {
706 // log_error("ssh_channel_open_session() error: SSH_AGAIN\n");
707 }
708 else // if (ret == SSH_ERROR)
709 {
710 log_error("ssh_channel_open_session() error: SSH_ERROR\n");
711 goto cleanup;
712 }
713 }
714 if (ret != SSH_OK)
715 {
716 prints("\033[1;31m连接超时!\033[m\r\n");
717 press_any_key();
718 goto cleanup;
719 }
720
721 ret = SSH_ERROR;
722 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
723 {
724 ret = ssh_channel_request_pty(channel);
725 if (ret == SSH_OK)
726 {
727 break;
728 }
729 else if (ret == SSH_AGAIN)
730 {
731 // log_error("ssh_channel_request_pty() error: SSH_AGAIN\n");
732 }
733 else // if (ret == SSH_ERROR)
734 {
735 log_error("ssh_channel_request_pty() error: SSH_ERROR\n");
736 goto cleanup;
737 }
738 }
739 if (ret != SSH_OK)
740 {
741 prints("\033[1;31m连接超时!\033[m\r\n");
742 press_any_key();
743 goto cleanup;
744 }
745
746 ret = SSH_ERROR;
747 while (!SYS_server_exit && time(NULL) - t_begin < SSH_CONNECT_TIMEOUT)
748 {
749 ret = ssh_channel_request_shell(channel);
750 if (ret == SSH_OK)
751 {
752 break;
753 }
754 else if (ret == SSH_AGAIN)
755 {
756 // log_error("ssh_channel_request_shell() error: SSH_AGAIN\n");
757 }
758 else // if (ret == SSH_ERROR)
759 {
760 log_error("ssh_channel_request_shell() error: SSH_ERROR\n");
761 goto cleanup;
762 }
763 }
764 if (ret != SSH_OK)
765 {
766 prints("\033[1;31m连接超时!\033[m\r\n");
767 press_any_key();
768 goto cleanup;
769 }
770 }
771
772 prints("\033[1;31m连接成功!\033[m\r\n");
773 iflush();
774 log_common("BBSNET connect to %s:%d from %s:%d by [%s]\n",
775 remote_addr, remote_port, local_addr, local_port, BBS_username);
776
777 snprintf(tocode, sizeof(tocode), "%s%s", bbsnet_conf[n].charset,
778 (strcasecmp(stdio_charset, bbsnet_conf[n].charset) == 0 ? "" : "//IGNORE"));
779 input_cd = iconv_open(tocode, stdio_charset);
780 if (input_cd == (iconv_t)(-1))
781 {
782 log_error("iconv_open(%s->%s) error: %d\n", stdio_charset, tocode, errno);
783 goto cleanup;
784 }
785
786 snprintf(tocode, sizeof(tocode), "%s%s", stdio_charset,
787 (strcasecmp(bbsnet_conf[n].charset, stdio_charset) == 0 ? "" : "//TRANSLIT"));
788 output_cd = iconv_open(tocode, bbsnet_conf[n].charset);
789 if (output_cd == (iconv_t)(-1))
790 {
791 log_error("iconv_open(%s->%s) error: %d\n", bbsnet_conf[n].charset, tocode, errno);
792 goto cleanup;
793 }
794
795 #ifdef HAVE_SYS_EPOLL_H
796 ev.events = EPOLLIN | EPOLLOUT | EPOLLET;
797 ev.data.fd = sock;
798 if (epoll_ctl(epollfd, EPOLL_CTL_MOD, sock, &ev) == -1)
799 {
800 log_error("epoll_ctl(socket) error (%d)\n", errno);
801 goto cleanup;
802 }
803
804 ev.events = EPOLLOUT | EPOLLET;
805 ev.data.fd = STDOUT_FILENO;
806 if (epoll_ctl(epollfd, EPOLL_CTL_ADD, STDOUT_FILENO, &ev) == -1)
807 {
808 log_error("epoll_ctl(STDOUT_FILENO) error (%d)\n", errno);
809 goto cleanup;
810 }
811 #endif
812
813 BBS_last_access_tm = t_used = time(NULL);
814 loop = 1;
815
816 while (loop && !SYS_server_exit)
817 {
818 if (SSH_v2 && ssh_channel_is_closed(SSH_channel))
819 {
820 log_debug("SSH channel is closed\n");
821 loop = 0;
822 break;
823 }
824
825 if (bbsnet_conf[n].use_ssh && ssh_channel_is_closed(channel))
826 {
827 log_debug("Remote SSH channel is closed\n");
828 loop = 0;
829 break;
830 }
831
832 #ifdef HAVE_SYS_EPOLL_H
833 nfds = epoll_wait(epollfd, events, MAX_EVENTS, 100); // 0.1 second
834 ret = nfds;
835 #else
836 pfds[0].fd = STDIN_FILENO;
837 pfds[0].events = POLLIN;
838 pfds[1].fd = sock;
839 pfds[1].events = POLLIN | POLLOUT;
840 pfds[2].fd = STDOUT_FILENO;
841 pfds[2].events = POLLOUT;
842 nfds = 3;
843 ret = poll(pfds, (nfds_t)nfds, 100); // 0.1 second
844 #endif
845
846 if (ret < 0)
847 {
848 if (errno != EINTR)
849 {
850 #ifdef HAVE_SYS_EPOLL_H
851 log_error("epoll_wait() error (%d)\n", errno);
852 #else
853 log_error("poll() error (%d)\n", errno);
854 #endif
855 break;
856 }
857 continue;
858 }
859 else if (ret == 0) // timeout
860 {
861 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
862 {
863 break;
864 }
865 }
866
867 for (int i = 0; i < nfds; i++)
868 {
869 #ifdef HAVE_SYS_EPOLL_H
870 if (events[i].events & (EPOLLHUP | EPOLLERR))
871 #else
872 if (pfds[i].revents & (POLLHUP | POLLERR))
873 #endif
874 {
875 #ifdef HAVE_SYS_EPOLL_H
876 log_debug("FD (%d) error events (%d)\n", events[i].data.fd, events[i].events);
877 #else
878 log_debug("FD (%d) error events (%d)\n", pfds[i].fd, pfds[i].revents);
879 #endif
880 loop = 0;
881 break;
882 }
883
884 #ifdef HAVE_SYS_EPOLL_H
885 if (events[i].data.fd == STDIN_FILENO && (events[i].events & EPOLLIN))
886 #else
887 if (pfds[i].fd == STDIN_FILENO && (pfds[i].revents & POLLIN))
888 #endif
889 {
890 stdin_read_wait = 1;
891 }
892
893 #ifdef HAVE_SYS_EPOLL_H
894 if (events[i].data.fd == sock)
895 #else
896 if (pfds[i].fd == sock)
897 #endif
898 {
899 #ifdef HAVE_SYS_EPOLL_H
900 if (events[i].events & EPOLLIN)
901 #else
902 if (pfds[i].revents & POLLIN)
903 #endif
904 {
905 sock_read_wait = 1;
906 }
907
908 #ifdef HAVE_SYS_EPOLL_H
909 if (events[i].events & EPOLLOUT)
910 #else
911 if (pfds[i].revents & POLLOUT)
912 #endif
913 {
914 sock_write_wait = 1;
915 }
916 }
917
918 #ifdef HAVE_SYS_EPOLL_H
919 if (events[i].data.fd == STDOUT_FILENO && (events[i].events & EPOLLOUT))
920 #else
921 if (pfds[i].fd == STDOUT_FILENO && (pfds[i].revents & POLLOUT))
922 #endif
923 {
924 stdout_write_wait = 1;
925 }
926 }
927
928 if (stdin_read_wait)
929 {
930 while (input_buf_len < sizeof(input_buf) && !SYS_server_exit)
931 {
932 if (SSH_v2)
933 {
934 ret = ssh_channel_read_nonblocking(SSH_channel, input_buf + input_buf_len, sizeof(input_buf) - (uint32_t)input_buf_len, 0);
935 if (ret == SSH_ERROR)
936 {
937 log_debug("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(SSH_session));
938 loop = 0;
939 break;
940 }
941 else if (ret == SSH_EOF)
942 {
943 stdin_read_wait = 0;
944 loop = 0;
945 break;
946 }
947 else if (ret == 0)
948 {
949 // Send NO-OP to remote server
950 input_buf[input_buf_len] = '\0';
951 input_buf_len++;
952 BBS_last_access_tm = time(NULL);
953
954 stdin_read_wait = 0;
955 break; // Check whether channel is still open
956 }
957 }
958 else
959 {
960 ret = (int)read(STDIN_FILENO, input_buf + input_buf_len, sizeof(input_buf) - (size_t)input_buf_len);
961 }
962 if (ret < 0)
963 {
964 if (errno == EAGAIN || errno == EWOULDBLOCK)
965 {
966 stdin_read_wait = 0;
967 break;
968 }
969 else if (errno == EINTR)
970 {
971 continue;
972 }
973 else
974 {
975 log_error("read(STDIN) error (%d)\n", errno);
976 loop = 0;
977 break;
978 }
979 }
980 else if (ret == 0) // broken pipe
981 {
982 log_debug("read(STDIN) EOF\n");
983 stdin_read_wait = 0;
984 loop = 0;
985 break;
986 }
987 else
988 {
989 input_buf_len += ret;
990 BBS_last_access_tm = time(NULL);
991
992 // Refresh current action while user input
993 if (user_online_update("BBS_NET") < 0)
994 {
995 log_error("user_online_update(BBS_NET) error\n");
996 }
997
998 continue;
999 }
1000 }
1001 }
1002
1003 if (sock_write_wait)
1004 {
1005 if (input_buf_offset < input_buf_len)
1006 {
1007 // For debug
1008 #ifdef _DEBUG
1009 for (int j = input_buf_offset; j < input_buf_len; j++)
1010 {
1011 log_debug("input: <--[%u]\n", (input_buf[j] + 256) % 256);
1012 }
1013 #endif
1014
1015 ret = io_buf_conv(input_cd, input_buf, &input_buf_len, &input_buf_offset, input_conv, sizeof(input_conv), &input_conv_len);
1016 if (ret < 0)
1017 {
1018 log_error("io_buf_conv(input, %d, %d, %d) error\n", input_buf_len, input_buf_offset, input_conv_len);
1019 input_buf_len = input_buf_offset; // Discard invalid sequence
1020 }
1021
1022 // For debug
1023 #ifdef _DEBUG
1024 for (int j = input_conv_offset; j < input_conv_len; j++)
1025 {
1026 log_debug("input_conv: <--[%u]\n", (input_conv[j] + 256) % 256);
1027 }
1028 #endif
1029 }
1030
1031 while (input_conv_offset < input_conv_len && !SYS_server_exit)
1032 {
1033 if (bbsnet_conf[n].use_ssh)
1034 {
1035 ret = ssh_channel_write(channel, input_conv + input_conv_offset, (uint32_t)(input_conv_len - input_conv_offset));
1036 if (ret == SSH_ERROR)
1037 {
1038 log_debug("ssh_channel_write() error: %s\n", ssh_get_error(session));
1039 loop = 0;
1040 break;
1041 }
1042 }
1043 else
1044 {
1045 ret = (int)write(sock, input_conv + input_conv_offset, (size_t)(input_conv_len - input_conv_offset));
1046 }
1047 if (ret < 0)
1048 {
1049 if (errno == EAGAIN || errno == EWOULDBLOCK)
1050 {
1051 sock_write_wait = 0;
1052 break;
1053 }
1054 else if (errno == EINTR)
1055 {
1056 continue;
1057 }
1058 else
1059 {
1060 log_debug("write(socket) error (%d)\n", errno);
1061 loop = 0;
1062 break;
1063 }
1064 }
1065 else if (ret == 0) // broken pipe
1066 {
1067 log_debug("write(socket) EOF\n");
1068 sock_write_wait = 0;
1069 loop = 0;
1070 break;
1071 }
1072 else
1073 {
1074 input_conv_offset += ret;
1075 if (input_conv_offset >= input_conv_len) // Output buffer complete
1076 {
1077 input_conv_offset = 0;
1078 input_conv_len = 0;
1079 break;
1080 }
1081 continue;
1082 }
1083 }
1084 }
1085
1086 if (sock_read_wait)
1087 {
1088 while (output_buf_len < sizeof(output_buf) && !SYS_server_exit)
1089 {
1090 if (bbsnet_conf[n].use_ssh)
1091 {
1092 ret = ssh_channel_read_nonblocking(channel, output_buf + output_buf_len,
1093 (uint32_t)(sizeof(output_buf) - (size_t)output_buf_len), 0);
1094 if (ret == SSH_ERROR)
1095 {
1096 log_debug("ssh_channel_read_nonblocking() error: %s\n", ssh_get_error(session));
1097 loop = 0;
1098 break;
1099 }
1100 else if (ret == SSH_EOF)
1101 {
1102 sock_read_wait = 0;
1103 loop = 0;
1104 break;
1105 }
1106 else if (ret == 0)
1107 {
1108 sock_read_wait = 0;
1109 break;
1110 }
1111 }
1112 else
1113 {
1114 ret = (int)read(sock, output_buf + output_buf_len, sizeof(output_buf) - (size_t)output_buf_len);
1115 }
1116 if (ret < 0)
1117 {
1118 if (errno == EAGAIN || errno == EWOULDBLOCK)
1119 {
1120 sock_read_wait = 0;
1121 break;
1122 }
1123 else if (errno == EINTR)
1124 {
1125 continue;
1126 }
1127 else
1128 {
1129 log_debug("read(socket) error (%d)\n", errno);
1130 loop = 0;
1131 break;
1132 }
1133 }
1134 else if (ret == 0) // broken pipe
1135 {
1136 log_debug("read(socket) EOF\n");
1137 sock_read_wait = 0;
1138 loop = 0;
1139 break;
1140 }
1141 else
1142 {
1143 output_buf_len += ret;
1144 continue;
1145 }
1146 }
1147 }
1148
1149 if (stdout_write_wait)
1150 {
1151 if (output_buf_offset < output_buf_len)
1152 {
1153 ret = io_buf_conv(output_cd, output_buf, &output_buf_len, &output_buf_offset, output_conv, sizeof(output_conv), &output_conv_len);
1154 if (ret < 0)
1155 {
1156 log_error("io_buf_conv(output, %d, %d, %d) error\n", output_buf_len, output_buf_offset, output_conv_len);
1157 output_buf_len = output_buf_offset; // Discard invalid sequence
1158 }
1159 }
1160
1161 while (output_conv_offset < output_conv_len && !SYS_server_exit)
1162 {
1163 if (SSH_v2)
1164 {
1165 ret = ssh_channel_write(SSH_channel, output_conv + output_conv_offset, (uint32_t)(output_conv_len - output_conv_offset));
1166 if (ret == SSH_ERROR)
1167 {
1168 log_debug("ssh_channel_write() error: %s\n", ssh_get_error(SSH_session));
1169 loop = 0;
1170 break;
1171 }
1172 }
1173 else
1174 {
1175 ret = (int)write(STDOUT_FILENO, output_conv + output_conv_offset, (size_t)(output_conv_len - output_conv_offset));
1176 }
1177 if (ret < 0)
1178 {
1179 if (errno == EAGAIN || errno == EWOULDBLOCK)
1180 {
1181 stdout_write_wait = 0;
1182 break;
1183 }
1184 else if (errno == EINTR)
1185 {
1186 continue;
1187 }
1188 else
1189 {
1190 log_debug("write(STDOUT) error (%d)\n", errno);
1191 loop = 0;
1192 break;
1193 }
1194 }
1195 else if (ret == 0) // broken pipe
1196 {
1197 log_debug("write(STDOUT) EOF\n");
1198 stdout_write_wait = 0;
1199 loop = 0;
1200 break;
1201 }
1202 else
1203 {
1204 output_conv_offset += ret;
1205 if (output_conv_offset >= output_conv_len) // Output buffer complete
1206 {
1207 output_conv_offset = 0;
1208 output_conv_len = 0;
1209 break;
1210 }
1211 continue;
1212 }
1213 }
1214 }
1215 }
1216
1217 cleanup:
1218 if (input_cd != (iconv_t)(-1))
1219 {
1220 iconv_close(input_cd);
1221 }
1222 if (output_cd != (iconv_t)(-1))
1223 {
1224 iconv_close(output_cd);
1225 }
1226
1227 #ifdef HAVE_SYS_EPOLL_H
1228 if (epollfd != -1 && close(epollfd) < 0)
1229 {
1230 log_error("close(epoll) error (%d)\n");
1231 }
1232 #endif
1233
1234 if (bbsnet_conf[n].use_ssh)
1235 {
1236 if (channel != NULL)
1237 {
1238 ssh_channel_free(channel);
1239 }
1240 if (session != NULL)
1241 {
1242 ssh_disconnect(session);
1243 ssh_free(session);
1244 }
1245 }
1246
1247 // Restore STDIN/STDOUT flags
1248 if (flags_stdin != -1 && fcntl(STDIN_FILENO, F_SETFL, flags_stdin) == -1)
1249 {
1250 log_error("fcntl(F_SETFL) error (%d)\n", errno);
1251 }
1252 if (flags_stdout != -1 && fcntl(STDOUT_FILENO, F_SETFL, flags_stdout) == -1)
1253 {
1254 log_error("fcntl(F_SETFL) error (%d)\n", errno);
1255 }
1256
1257 if (sock != -1 && close(sock) == -1)
1258 {
1259 log_error("Close socket failed\n");
1260 }
1261
1262 if (res)
1263 {
1264 freeaddrinfo(res);
1265 }
1266
1267 t_used = time(NULL) - t_used;
1268 tm_used = gmtime(&t_used);
1269
1270 log_common("BBSNET disconnect, %d days %d hours %d minutes %d seconds used\n",
1271 tm_used->tm_yday, tm_used->tm_hour, tm_used->tm_min, tm_used->tm_sec);
1272
1273 BBS_last_access_tm = time(NULL);
1274
1275 return 0;
1276 }
1277
1278 static int bbsnet_refresh()
1279 {
1280 clearscr();
1281
1282 moveto(1, 1);
1283 prints(" ------------------------------------------------------------------------------ ");
1284 for (int i = 2; i < 19; i++)
1285 {
1286 moveto(i, 1);
1287 prints("|");
1288 moveto(i, 80);
1289 prints("|");
1290 }
1291 moveto(19, 1);
1292 prints("|------------------------------------------------------------------------------|");
1293 moveto(22, 1);
1294 prints(" ------------------------------------------------------------------------------ ");
1295 moveto(23, 1);
1296 prints(" [\033[1;32mCtrl+C\033[m]退出");
1297
1298 iflush();
1299
1300 return 0;
1301 }
1302
1303 static int bbsnet_selchange()
1304 {
1305 int i = bbsnet_menu.menu_item_pos[0];
1306
1307 moveto(20, 1);
1308 clrtoeol();
1309 prints("|\033[1m单位: \033[1;33m%s\033[m%*s 站名: \033[1;33m%s\033[m%*s 类型: \033[1;33m%s\033[m",
1310 bbsnet_conf[i].org_name, 20 - str_length(bbsnet_conf[i].org_name, 1), "",
1311 bbsnet_conf[i].site_name, 20 - str_length(bbsnet_conf[i].site_name, 1), "",
1312 (bbsnet_conf[i].use_ssh ? "SSH" : "Telnet"));
1313 moveto(20, 80);
1314 prints("|");
1315 moveto(21, 1);
1316 clrtoeol();
1317 prints("|\033[1m连往: \033[1;33m%-20s\033[m 端口: \033[1;33m%-5s\033[m 编码: \033[1;33m%s\033[m",
1318 bbsnet_conf[i].host_name, bbsnet_conf[i].port, bbsnet_conf[i].charset);
1319 moveto(21, 80);
1320 prints("|");
1321 iflush();
1322
1323 return 0;
1324 }
1325
1326 int bbs_net()
1327 {
1328 int ch, i;
1329
1330 if (load_bbsnet_conf(CONF_BBSNET) < 0)
1331 {
1332 clearscr();
1333 moveto(1, 1);
1334 prints("加载穿梭配置失败!");
1335 press_any_key();
1336 return -1;
1337 }
1338
1339 bbsnet_refresh();
1340 display_menu(&bbsnet_menu);
1341 bbsnet_selchange();
1342
1343 while (!SYS_server_exit)
1344 {
1345 ch = igetch(100);
1346
1347 if (ch != KEY_NULL && ch != KEY_TIMEOUT)
1348 {
1349 BBS_last_access_tm = time(NULL);
1350 }
1351
1352 switch (ch)
1353 {
1354 case KEY_NULL: // broken pipe
1355 log_debug("KEY_NULL\n");
1356 goto cleanup;
1357 case KEY_TIMEOUT:
1358 if (time(NULL) - BBS_last_access_tm >= BBS_max_user_idle_time)
1359 {
1360 log_error("User input timeout\n");
1361 goto cleanup;
1362 }
1363 continue;
1364 case KEY_ESC:
1365 case Ctrl('C'): // user cancel
1366 goto cleanup;
1367 case CR:
1368 bbsnet_connect(bbsnet_menu.menu_item_pos[0]);
1369 // Force cleanup anything remaining in the output buffer
1370 clearscr();
1371 iflush();
1372 // Clear screen and redraw menu
1373 bbsnet_refresh();
1374 display_menu(&bbsnet_menu);
1375 bbsnet_selchange();
1376 break;
1377 case KEY_UP:
1378 for (i = 0; i < STATION_PER_LINE; i++)
1379 {
1380 menu_control(&bbsnet_menu, KEY_UP);
1381 }
1382 bbsnet_selchange();
1383 break;
1384 case KEY_DOWN:
1385 for (i = 0; i < STATION_PER_LINE; i++)
1386 {
1387 menu_control(&bbsnet_menu, KEY_DOWN);
1388 }
1389 bbsnet_selchange();
1390 break;
1391 case KEY_LEFT:
1392 menu_control(&bbsnet_menu, KEY_UP);
1393 bbsnet_selchange();
1394 break;
1395 case KEY_RIGHT:
1396 menu_control(&bbsnet_menu, KEY_DOWN);
1397 bbsnet_selchange();
1398 break;
1399 case KEY_HOME:
1400 case KEY_PGUP:
1401 menu_control(&bbsnet_menu, KEY_PGUP);
1402 bbsnet_selchange();
1403 break;
1404 case KEY_END:
1405 case KEY_PGDN:
1406 menu_control(&bbsnet_menu, KEY_PGDN);
1407 bbsnet_selchange();
1408 break;
1409 default:
1410 menu_control(&bbsnet_menu, ch);
1411 bbsnet_selchange();
1412 break;
1413 }
1414 }
1415
1416 cleanup:
1417 unload_bbsnet_conf();
1418
1419 return 0;
1420 }

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1