初版:http://www.cnblogs.com/wjshan0808/p/6580638.html

说明:在实现了对应的接口后该策略可以适合绝大多数的网络数据包结构

首先,是三个接口

IProduceProxy.h

#ifndef _I_PRODUCE_PROXY_H_
#define _I_PRODUCE_PROXY_H_ //Code
#define CODE_PRODUCE_PROXY_OK 0x00 //OK
#define CODE_PRODUCE_PROXY_NI 0x01 //Not Implemented
#define CODE_PRODUCE_PROXY_NT 0x02 //Nothing
#define CODE_PRODUCE_PROXY_RY 0x0F //Ready //INTERFACE
class CIProduceProxy
{
public:
virtual int ProduceProxy(char* &szBuffer, int &nBufferLength) = ;
}; //PFN
typedef int(CIProduceProxy::*PFN_PRODUCEPROXY)(char* &szBuffer, int &nBufferLength); #endif //_I_PRODUCE_PROXY_H_

IStrategyProtocol.h

#ifndef _I_STRATEGY_PROTOCOL_H_
#define _I_STRATEGY_PROTOCOL_H_ //CODE
#define CODE_STRATEGY_PROTOCOL_OK 0x00 //OK
#define CODE_STRATEGY_PROTOCOL_NI 0x01 //Not Implemented
#define CODE_STRATEGY_PROTOCOL_ML 0x02 //Miss Length
#define CODE_STRATEGY_PROTOCOL_RY 0x0F //Ready //INTERFACE
class CIStrategyProtocol
{
public:
virtual int ExtractLength(const char* szBuffer, int nBufferLength, int &nExtractLength) = ;
}; //PFN
typedef int (CIStrategyProtocol::*PFN_STRATEGYPROTOCOL)(const char* szBuffer, int nBufferLength, int &nExtractLength); #endif //_I_STRATEGY_PROTOCOL_H_

IConsumeProxy.h

#ifndef _I_CONSUME_PROXY_H_
#define _I_CONSUME_PROXY_H_ //Code
#define CODE_CONSUME_PROXY_OK 0x00 //OK
#define CODE_CONSUME_PROXY_NI 0x01 //Not Implemented
#define CODE_CONSUME_PROXY_RY 0x0F //Ready //INTERFACE
class CIConsumeProxy
{
public:
virtual int ConsumeProxy(const char* szBuffer, int nBufferLength) = ;
}; //PFN
typedef int(CIConsumeProxy::*PFN_CONSUMEPROXY)(const char* szBuffer, int nBufferLength); #endif //_I_CONSUME_PROXY_H_

然后,例如我们有如下一个协议对象,实现IStrategyProtocol接口

.h

#ifndef _PROTOCOL_H_
#define _PROTOCOL_H_ #include "IStrategyProtocol.h" class CProtocol : public CIStrategyProtocol
{
public:
CProtocol();
~CProtocol(); public:
int ExtractLength(const char* szBuffer, int nBufferLength, int &nExtractLength) override; }; #endif //_PROTOCOL_H_

.cpp

#include "Protocol.h"

CProtocol::CProtocol()
{
}
CProtocol::~CProtocol()
{
} int CProtocol::ExtractLength(const char* szBuffer, int nBufferLength, int &nExtractLength)
{
nExtractLength = ; if (false)
return CODE_STRATEGY_PROTOCOL_ML; //... return CODE_STRATEGY_PROTOCOL_OK;
}

其次,例如我们有如下的网络端对象,实现IProduceProxy,IConsumeProxy接口
.h

#ifndef _NET_CLIENT_H_
#define _NET_CLIENT_H_ #include "ExtractTask.h"
#include "Protocol.h" class CNetClient : public CIProduceProxy, public CIConsumeProxy
{
public:
CNetClient();
~CNetClient(); public:
int Init();
int Receive(char* szReceiveBuffer, int nBufferLength);
int Processing(const char* szData, int nDataLength); public:
int ProduceProxy(char* &szBuffer, int &nBufferLength) override;
int ConsumeProxy(const char* szBuffer, int nBufferLength) override; private:
CExtractTask* m_pExtractor;
CProtocol* m_pProtocol;
}; #endif //_DRIVE_M_40064900_H_

.cpp

#include "NetClient.h"

CNetClient::CNetClient()
{
m_pProtocol = new CProtocol();
m_pExtractor = new CExtractTask();
}
CNetClient::~CNetClient()
{
} int CNetClient::Init()
{
m_pExtractor->Proxies(this, this->m_pProtocol, this); return ;
} int CNetClient::ProduceProxy(char* &szBuffer, int &nBufferLength)
{
nBufferLength = Receive(szBuffer, nBufferLength);
if (nBufferLength <= )
return CODE_PRODUCE_PROXY_NT;
return CODE_PRODUCE_PROXY_OK;
} int CNetClient::ConsumeProxy(const char* szBuffer, int nBufferLength)
{
Processing(szBuffer, nBufferLength);
return CODE_CONSUME_PROXY_OK;
}

最终是我们的解析策略实现对象
.h

#ifndef _EXTRACT_TASK_H_
#define _EXTRACT_TASK_H_ #include "IStrategyProtocol.h"
#include "IProduceProxy.h"
#include "IConsumeProxy.h" class CExtractTask
{
public:
CExtractTask();
virtual ~CExtractTask(); public:
int Proxies(CIProduceProxy* pProducer, CIStrategyProtocol* pStrategy, CIConsumeProxy* pConsumer);
//int Proxies(PFN_PRODUCEPROXY pfnProducer, PFN_STRATEGYPROTOCOL pfnStrategy, PFN_CONSUMEPROXY pfnConsumer); protected:
virtual int ProduceImply(char* &szBuffer, int &nBufferLength);
virtual int StrategyImply(const char* szBuffer, int nBufferLength, int &nExtractLength);
virtual int ConsumeImply(const char* szExtractCopier, int nExtractLength); private:
int Extractor(); private:
CIProduceProxy* m_pProducer;
//PFN_PRODUCEPROXY m_pfnProducer;
CIStrategyProtocol* m_pStrategy;
//PFN_STRATEGYPROTOCOL m_pfnStrategy;
CIConsumeProxy* m_pConsumer;
//PFN_CONSUMEPROXY m_pfnConsumer;
}; #endif //_EXTRACT_TASK_H_

.cpp

#include "ExtractTask.h"
#include <cstring>
#ifdef WIN32
#include <Windows.h>
#else
#include <unistd.h>
#endif //WIN32 #define TIME_BASE_UNIT_VALUE 1000
#define TIME_TASK_SLEEP_16MS 16
#ifdef WIN32
#define TIME_EXTRACT_8MS 8
#else
#define TIME_EXTRACT_8MS (8 * TIME_BASE_UNIT_VALUE)
#endif // WIN32 #define LENGTH_EXTRACT_BUFFER (1024 * 4) //接收缓冲区大小 using namespace std; CExtractTask::CExtractTask() :
m_pProducer(NULL), m_pStrategy(NULL), m_pConsumer(NULL)
//, m_pfnProducer(NULL), m_pfnStrategy(NULL), m_pfnConsumer(NULL)
{
}
CExtractTask::~CExtractTask(void)
{
/*
m_pfnProducer = NULL;
m_pfnStrategy = NULL;
m_pfnConsumer = NULL;
*/
/*
if (m_pProducer != NULL)
delete m_pProducer;
if (m_pStrategy != NULL)
delete m_pStrategy;
if (m_pConsumer != NULL)
delete m_pConsumer;
*/
} int CExtractTask::Proxies(CIProduceProxy* pProducer, CIStrategyProtocol* pStrategy, CIConsumeProxy* pConsumer)
{
m_pProducer = pProducer;
m_pStrategy = pStrategy;
m_pConsumer = pConsumer; return ;
}
/*
int CExtractTask::Proxies(PFN_PRODUCEPROXY pfnProducer, PFN_STRATEGYPROTOCOL pfnStrategy, PFN_CONSUMEPROXY pfnConsumer)
{
m_pfnProducer = pfnProducer;
m_pfnStrategy = pfnStrategy;
m_pfnConsumer = pfnConsumer; return 0;
}
*/
int CExtractTask::ProduceImply(char* &szBuffer, int &nBufferLength)
{
if (m_pProducer == NULL)// && m_pfnProducer == NULL)
return CODE_PRODUCE_PROXY_NI; if (m_pProducer != NULL)
return m_pProducer->ProduceProxy(szBuffer, nBufferLength);
//else if (m_pfnProducer != NULL)
// return m_pfnProducer(szBuffer, nBufferLength); return CODE_PRODUCE_PROXY_RY;
} int CExtractTask::StrategyImply(const char* szBuffer, int nBufferLength, int &nExtractLength)
{
if (m_pStrategy == NULL)// && m_pfnStrategy == NULL)
return CODE_STRATEGY_PROTOCOL_NI; if (m_pStrategy != NULL)
return m_pStrategy->ExtractLength(szBuffer, nBufferLength, nExtractLength);
//else if (m_pfnStrategy != NULL)
// return m_pfnStrategy(szBuffer, nBufferLength, nExtractLength); return CODE_STRATEGY_PROTOCOL_RY;
} int CExtractTask::ConsumeImply(const char* szExtractCopier, int nExtractLength)
{
if (m_pConsumer == NULL)// && m_pfnConsumer == NULL)
return CODE_CONSUME_PROXY_NI; if (m_pConsumer != NULL)
return m_pConsumer->ConsumeProxy(szExtractCopier, nExtractLength);
//else if (m_pfnConsumer != NULL)
// return m_pfnConsumer(szExtractCopier, nExtractLength); return CODE_CONSUME_PROXY_RY;
} int CExtractTask::Extractor()
{
int nSurplusLength = ;
char* szExtractCopier = NULL;
char* szExtractCopyIterator = NULL;
//Extract Buffer from Product Proxy.
do
{
//Extract Buffer
char* szExtractBuffer = new char[LENGTH_EXTRACT_BUFFER]();
//Extract Length
int nExtractBufferLength = LENGTH_EXTRACT_BUFFER;
//Productor Proxy
int nRet = ProduceImply(szExtractBuffer, nExtractBufferLength);
if (nRet != CODE_PRODUCE_PROXY_OK)
{
//LogMessage(LOGLEVEL_DEBUG, "ProduceProxy Return(%d).", nRet);
delete[] szExtractBuffer;
break;
}
//LogMessage(LOGLEVEL_INFO, "ProduceProxy Extract Buffer-Length(%d).", nExtractBufferLength); //Clone Extractor to extract
char* szExtractor = szExtractBuffer;
//Begin to Extract by The Rules
do
{
//Surplus Length less than or equal to zero that Means new could be create
if (nSurplusLength <= )
{
//Got Extract-Length from RuleProxy(Extract Whole Length)
int nExtractLength = ;
nRet = StrategyImply(szExtractor, nExtractBufferLength, nExtractLength);
if (nRet != CODE_STRATEGY_PROTOCOL_OK)
{
break;
}
//To new that Means variate value is equal between nSurplusLength and nExtractLength.
nSurplusLength = nExtractLength; //Allocate enough space for new
szExtractCopier = new char[nExtractLength + ]();
//Mark Movable Pointer for Copier
szExtractCopyIterator = szExtractCopier;
}
//when ExtractBufferLength is less than SurplusLength that Means Data copy is continue
if (nExtractBufferLength < nSurplusLength)
{
//Doing copy
memcpy(szExtractCopyIterator, szExtractor, nExtractBufferLength);
//Move ExtractCopyIterator position
szExtractCopyIterator += nExtractBufferLength;
//Cut down SurplusLength
nSurplusLength -= nExtractBufferLength;
//Move Extractor position
szExtractor += nExtractBufferLength;
//Cut down ExtractBufferLength
nExtractBufferLength -= nExtractBufferLength;
}
else//(nExtractBufferLength >= nSurplusLength)
{
//Doing copy
memcpy(szExtractCopyIterator, szExtractor, nSurplusLength);
//Move Extractor position
szExtractor += nSurplusLength;
//Cut down ExtractBufferLength
nExtractBufferLength -= nSurplusLength;
//Move ExtractCopyIterator position
szExtractCopyIterator += nSurplusLength;
//Cut down SurplusLength
nSurplusLength -= nSurplusLength;
//Package Whole Length
ConsumeImply(szExtractCopier, (szExtractCopyIterator - szExtractCopier));
//Clean szExtractCopier
delete[] szExtractCopier;
szExtractCopier = NULL;
}
} while (nExtractBufferLength > );
//Clean szExtractBuffer
delete[] szExtractBuffer; #ifdef WIN32
Sleep(TIME_EXTRACT_8MS);
#else
usleep(TIME_EXTRACT_8MS);
#endif // WIN32
} while (!m_bStopStream);
//Clean szExtractCopier
if (szExtractCopier != NULL)
delete[] szExtractCopier;
return ;
}

C++版的网络数据包解析策略(升级版)的更多相关文章

  1. 一个C++版的网络数据包解析策略

    C++版的网络数据包解析策略(升级版) 一.数据包格式形如下图 二.代码 int ReceiveFromRemoteEndPoint() { int nPackageDataLength = ; ch ...

  2. LINUX下的远端主机登入 校园网络注册 网络数据包转发和捕获

    第一部分:LINUX 下的远端主机登入和校园网注册 校园网内目的主机远程管理登入程序 本程序为校园网内远程登入,管理功能,该程序分服务器端和客户端两部分:服务器端为remote_server_udp. ...

  3. Linux 中的网络数据包捕获

    Linux 中的网络数据包捕获 Ashish Chaurasia, 工程师 简介: 本教程介绍了捕获和操纵数据包的不同机制.安全应用程序,如 VPN.防火墙和嗅探器,以及网络应用程序,如路由程序,都依 ...

  4. sk_buff封装和解封装网络数据包的过程详解(转载)

    http://dog250.blog.51cto.com/2466061/1612791 可以说sk_buff结构体是Linux网络协议栈的核心中的核心,几乎所有的操作都是围绕sk_buff这个结构体 ...

  5. linux2.6.24内核源代码分析(2)——扒一扒网络数据包在链路层的流向路径之一

    在2.6.24内核中链路层接收网络数据包出现了两种方法,第一种是传统方法,利用中断来接收网络数据包,适用于低速设备:第二种是New Api(简称NAPI)方法,利用了中断+轮询的方法来接收网络数据包, ...

  6. 用C++实现网络编程---抓取网络数据包的实现方法

    一般都熟悉sniffer这个工具,它可以捕捉流经本地网卡的所有数据包.抓取网络数据包进行分析有很多用处,如分析网络是否有网络病毒等异常数据,通信协议的分析(数据链路层协议.IP.UDP.TCP.甚至各 ...

  7. Android利用tcpdump和wireshark抓取网络数据包

    Android利用tcpdump和wireshark抓取网络数据包 主要介绍如何利用tcpdump抓取andorid手机上网络数据请求,利用Wireshark可以清晰的查看到网络请求的各个过程包括三次 ...

  8. UNIX网络编程——网络数据包检测

    网络数据包检测 数据包捕获(sniffer):是指在网络上进行数据收集的行为,需要通过网卡来完成. 三种访问方式: BSD Packet Filter(BPF) SVR4 Datalink Provi ...

  9. 发现新大陆:一个最简单的破解SSL加密网络数据包的方法

    1. 简介 相信能访问到这篇文章的同行基本上都会用过流行的网络抓包工具WireShark,用它来抓取相应的网络数据包来进行问题分析或者其他你懂的之类的事情. 一般来说,我们用WireShark来抓取包 ...

随机推荐

  1. Java实现蓝桥杯算法提高 哥德巴赫猜想

    试题 算法提高 哥德巴赫猜想 资源限制 时间限制:1.0s 内存限制:256.0MB 问题描述 根据所给函数(判断一个整数是否是素数),然后依托该函数,将输入N内的偶数(6-N),输出为两个素数之和( ...

  2. ubuntu下Vivado launch SDK后,SDK无菜单栏解决办法

    最近在调Xilinx的ZYNQ 7015,按照教程从Vivado中Launch SDK后遇到了个问题,SDK的菜单栏消失了,真的没了,我的环境是ubuntu 16.4.百度好久都没有人遇到该问题,经过 ...

  3. iOS -实现UIView圆角显示的方法

    添加一个UIView时,默认直角显示有时对于有强迫症的患者还真有点不舒服! eg: 怎么实现UIview的圆角显示呢? 首先包含一个头文件: #import <QuartzCore/Quartz ...

  4. 如何在Linux上安装Redis(内附详细教程)

    前言 hello,好久不见,又断更了一段时间.同事大部分离职了,但是活还是一样,所以只能硬着头皮顶上.现在总算歇会了,决定开启Redis源码系列,希望不要啪啪啪打脸. ​ 什么是redis? Redi ...

  5. 如何通过IAM打造零信任安全架构

    万物互联时代来临,面对越来越严峻的企业网络安全及复杂的(如微服务,容器编排和云计算)开发.生产环境,企业 IT 急需一套全新的身份和访问控制管理方案. 为了满足企业需求,更好的服务企业用户,青云Qin ...

  6. 1.4 Spring 依赖注入(DI)和控制反转(IOC)详解

    自己开发了一个股票智能分析软件,功能很强大,需要的点击下面的链接获取: https://www.cnblogs.com/bclshuai/p/11380657.html 1.1  Spring 依赖注 ...

  7. scws中文分词安装和使用

    一.下载源码 wget http://www.xunsearch.com/scws/down/scws-1.2.3.tar.bz2 tar xvjf scws-1.2.3.tar.bz2 二.执行配置 ...

  8. @atcoder - ARC077F@ SS

    目录 @description@ @solution@ @accepted code@ @details@ @description@ 规定一个字符串为 "偶串" 当且仅当它可以表 ...

  9. Idea创建Scala的Maven项目

    Idea版本(2018.1.5) Scala版本(2.11.0) Java版本(1.8.0_151) 创建Scala的Maven项目 Idea新建项目如图,输入GroupId和ArtifactId之后 ...

  10. vulstack红队评估(二)

    一.环境搭建: 1.根据作者公开的靶机信息整理: 靶场统一登录密码:1qaz@WSX     2.网络环境配置: ①Win2008双网卡模拟内外网: 外网:192.168.1.80,桥接模式与物理机相 ...