博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
websocket工作原理
阅读量:4542 次
发布时间:2019-06-08

本文共 7215 字,大约阅读时间需要 24 分钟。

# websocketfrom geventwebsocket.server import WSGIServer  # 我要WSGI为我提供服务from geventwebsocket.handler import WebSocketHandler  # WSGI 遇到WS协议的时候,处理方式from geventwebsocket.websocket import WebSocket  # 语法提示# 基于Flask+geventwebsocketfrom flask import Flask, request,render_templateapp = Flask(__name__)##多人聊天user_socket_list=[]@app.route("/ws")def my_ws_func():    # print(dir(request.environ))    user_socket = request.environ.get("wsgi.websocket") #type:WebSocket    # print(user_socket) #
user_socket_list.append(user_socket) while 1: msg = user_socket.receive() #等待接收客户端发送过来的消息 for use in user_socket_list: # #看不到自己的发送信息 # if use==user_socket: # continue try: use.send(msg) except: continue # print(msg) # user_socket.send(msg)@app.route("/group_chart")def group_chart(): return render_template("group_chart.html")"""['__class__', '__contains__', '__delattr__', '__delitem__', '__dir__', '__doc__', '__eq__', '__format__', '__ge__', '__getattribute__', '__getitem__', '__gt__', '__hash__', '__init__', '__init_subclass__', '__iter__', '__le__', '__len__', '__lt__', '__ne__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__setitem__', '__sizeof__', '__str__', '__subclasshook__', 'clear', 'copy', 'fromkeys', 'get', 'items', 'keys', 'pop', 'popitem', 'setdefault', 'update', 'values']"""if __name__ == '__main__': # app.run() http_serv = WSGIServer(("192.168.0.103", 3721), application=app, handler_class=WebSocketHandler) http_serv.serve_forever()##http://192.168.0.103:3721/group_chart##templates/group_chart.html"""
Title

发送消息:

"""
群聊
# websocketfrom geventwebsocket.server import WSGIServer  # 我要WSGI为我提供服务from geventwebsocket.handler import WebSocketHandler  # WSGI 遇到WS协议的时候,处理方式from geventwebsocket.websocket import WebSocket  # 语法提示# 基于Flask+geventwebsocketfrom flask import Flask, request,render_templateapp = Flask(__name__)##单聊import jsonuser_socket_dict={}"""'tom':
,'rose':
"""@app.route("/wsone/
")def my_func(nickname): user_socket = request.environ.get("wsgi.websocket") #type:WebSocket user_socket_dict[nickname]=user_socket while 1: msg = user_socket.receive() #等待接收客户端发送过来的消息 msg = json.loads(msg) """ { to_user: from_user: message:"" } """ print(msg) to_user_socket = user_socket_dict.get(msg.get('to_user')) to_user_socket.send(json.dumps(msg))@app.route("/one_chart")def group_chart(): return render_template("one_chart.html")"""['__class__', '__contains__', '__delattr__', '__delitem__', '__dir__', '__doc__', '__eq__', '__format__', '__ge__', '__getattribute__', '__getitem__', '__gt__', '__hash__', '__init__', '__init_subclass__', '__iter__', '__le__', '__len__', '__lt__', '__ne__', '__new__', '__reduce__', '__reduce_ex__', '__repr__', '__setattr__', '__setitem__', '__sizeof__', '__str__', '__subclasshook__', 'clear', 'copy', 'fromkeys', 'get', 'items', 'keys', 'pop', 'popitem', 'setdefault', 'update', 'values']"""if __name__ == '__main__': # app.run() http_serv = WSGIServer(("192.168.0.103", 3721), application=app, handler_class=WebSocketHandler) http_serv.serve_forever()##http://192.168.0.103:3721/one_chart 都登陆以后聊天#templates/one_chart.html"""
Title

登陆

给:

发送消息:

"""
单聊
import socket, base64, hashlibsock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)sock.bind(('127.0.0.1', 3721))sock.listen(5)# 获取客户端socket对象conn, address = sock.accept()# 获取客户端的【握手】信息data = conn.recv(1024)print(data)"""b'GET / HTTP/1.1\r\nHost: 127.0.0.1:3721\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:68.0) Gecko/20100101 Firefox/68.0\r\nAccept: */*\r\nAccept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2\r\nAccept-Encoding: gzip, deflate\r\nSec-WebSocket-Version: 13\r\nOrigin: http://localhost:63342\r\nSec-WebSocket-Extensions: permessage-deflate\r\nSec-WebSocket-Key: 9hCIuQr2e0nm9/5ZfpihZg==\r\nConnection: keep-alive, Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\n\r\n'"""# magic string为:258EAFA5-E914-47DA-95CA-C5AB0DC85B11magic_string = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'# 取出Sec-WebSocket-Keydef get_headers(data):    header_dict = {}    header_str = data.decode("utf8")    for i in header_str.split("\r\n"):        if str(i).startswith("Sec-WebSocket-Key"):            header_dict["Sec-WebSocket-Key"] = i.split(":")[1].strip()    return header_dict# def get_header(data):#     """#      将请求头格式化成字典#      :param data:#      :return:#      """#     header_dict = {}#     data = str(data, encoding='utf-8')##     header, body = data.split('\r\n\r\n', 1)#     header_list = header.split('\r\n')#     for i in range(0, len(header_list)):#         if i == 0:#             if len(header_list[i].split(' ')) == 3:#                 header_dict['method'], header_dict['url'], header_dict['protocol'] = header_list[i].split(' ')#         else:#             k, v = header_list[i].split(':', 1)#             header_dict[k] = v.strip()#     return header_dict#headers = get_headers(data)  # 提取请求头信息# 对请求头中的sec-websocket-key进行加密value = headers['Sec-WebSocket-Key'] + magic_stringprint(value)ac = base64.b64encode(hashlib.sha1(value.encode('utf-8')).digest())print(ac)# 响应response_tpl = "HTTP/1.1 101 Switching Protocols\r\n" \               "Upgrade:websocket\r\n" \               "Connection: Upgrade\r\n" \               "Sec-WebSocket-Accept: %s\r\n" \               "WebSocket-Location: ws://127.0.0.1:3721\r\n\r\n"response_str = response_tpl % (ac.decode('utf-8'))# 响应【握手】信息conn.send(response_str.encode("utf8"))while True:    msg = conn.recv(8096)    print(msg)##"""    
Title"""
WebSocket
# b'\x81\x83\xceH\xb6\x85\xffz\x85'hashstr = b'\x81\x83\xceH\xb6\x85\xffz\x85'# b'\x81    \x83    \xceH\xb6\x85\xffz\x85'# 将第二个字节也就是 \x83 第9-16位 进行与127进行位运算payload = hashstr[1] & 127print(payload)if payload == 127:    extend_payload_len = hashstr[2:10]    mask = hashstr[10:14]    decoded = hashstr[14:]# 当位运算结果等于127时,则第3-10个字节为数据长度# 第11-14字节为mask 解密所需字符串# 则数据为第15字节至结尾if payload == 126:    extend_payload_len = hashstr[2:4]    mask = hashstr[4:8]    decoded = hashstr[8:]# 当位运算结果等于126时,则第3-4个字节为数据长度# 第5-8字节为mask 解密所需字符串# 则数据为第9字节至结尾if payload <= 125:    extend_payload_len = None    mask = hashstr[2:6]    decoded = hashstr[6:]# 当位运算结果小于等于125时,则这个数字就是数据的长度# 第3-6字节为mask 解密所需字符串# 则数据为第7字节至结尾str_byte = bytearray() #流的数组for i in range(len(decoded)):    byte = decoded[i] ^ mask[i % 4]    str_byte.append(byte)print(str_byte.decode("utf8"))
解密
import structmsg_bytes = "hello".encode("utf8")token = b"\x81"length = len(msg_bytes)if length <= 254:    token += struct.pack("B", length)elif length <= 65535:    token += struct.pack("!BH", 126, length)else:    token += struct.pack("!BQ", 127, length)msg = token + msg_bytesprint(msg)
加密

 

转载于:https://www.cnblogs.com/bubu99/p/11324666.html

你可能感兴趣的文章
codechef : Marbles 题解
查看>>
突然的明白--public static 类名 函数名()
查看>>
MAVEN打包的`parent.relativePath points at wrong local POM`问题
查看>>
git参考, 小结
查看>>
C#NumberFormatInfo类
查看>>
java:线上问题排查常用手段
查看>>
pygame-KidsCanCode系列jumpy-part16-enemy敌人
查看>>
[svc][cpu][jk]cpu的核心查看及什么是cpu的负载
查看>>
C# 平台问题
查看>>
从构建分布式秒杀系统聊聊WebSocket推送通知
查看>>
hash扩展攻击本地实验
查看>>
git常用命令
查看>>
C# Equals
查看>>
面试1
查看>>
Git学习总结
查看>>
穿透防火墙的数据传输新技术
查看>>
Button加在UITableViewHeaderFooterView的self.contentView上导致不能响应点击
查看>>
TinkerPop中的遍历:图的遍历策略
查看>>
shell入门-sort排序
查看>>
[转]BT原理分析
查看>>