zoukankan      html  css  js  c++  java
  • 浅谈websocket

    用socket实例模拟websocket

     1 import socket, base64, hashlib
     2 
     3 sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
     4 sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
     5 sock.bind(('127.0.0.1', 9527))
     6 sock.listen(5)
     7 # 获取客户端socket对象
     8 conn, address = sock.accept()
     9 # 获取客户端的【握手】信息
    10 data = conn.recv(1024)
    11 print(data)
    12 """
    13 b'GET /ws HTTP/1.1
    
    14 Host: 127.0.0.1:9527
    
    15 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0
    
    16 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    
    17 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
    
    18 Accept-Encoding: gzip, deflate
    
    19 Sec-WebSocket-Version: 13
    
    20 Origin: http://localhost:63342
    
    21 Sec-WebSocket-Extensions: permessage-deflate
    
    22 Sec-WebSocket-Key: jocLOLLq1BQWp0aZgEWL5A==
    
    23 Cookie: session=6f2bab18-2dc4-426a-8f06-de22909b967b
    
    24 Connection: keep-alive, Upgrade
    
    25 Pragma: no-cache
    
    26 Cache-Control: no-cache
    
    27 Upgrade: websocket
    
    '
    28 """
    29 
    30 # magic string为:258EAFA5-E914-47DA-95CA-C5AB0DC85B11
    31 magic_string = '258EAFA5-E914-47DA-95CA-C5AB0DC85B11'
    32 
    33 
    34 def get_headers(data):
    35     header_dict = {}
    36     header_str = data.decode("utf8")
    37     for i in header_str.split("
    "):
    38         if str(i).startswith("Sec-WebSocket-Key"):
    39             header_dict["Sec-WebSocket-Key"] = i.split(":")[1].strip()
    40 
    41     return header_dict
    42 
    43 
    44 def get_header(data):
    45     """
    46      将请求头格式化成字典
    47      :param data:
    48      :return:
    49      """
    50     header_dict = {}
    51     data = str(data, encoding='utf-8')
    52 
    53     header, body = data.split('
    
    ', 1)
    54     header_list = header.split('
    ')
    55     for i in range(0, len(header_list)):
    56         if i == 0:
    57             if len(header_list[i].split(' ')) == 3:
    58                 header_dict['method'], header_dict['url'], header_dict['protocol'] = header_list[i].split(' ')
    59         else:
    60             k, v = header_list[i].split(':', 1)
    61             header_dict[k] = v.strip()
    62     return header_dict
    63 
    64 
    65 headers = get_headers(data)  # 提取请求头信息
    66 # 对请求头中的sec-websocket-key进行加密
    67 response_tpl = "HTTP/1.1 101 Switching Protocols
    " 
    68                "Upgrade:websocket
    " 
    69                "Connection: Upgrade
    " 
    70                "Sec-WebSocket-Accept: %s
    " 
    71                "WebSocket-Location: ws://127.0.0.1:9527
    
    "
    72 
    73 value = headers['Sec-WebSocket-Key'] + magic_string
    74 print(value)
    75 ac = base64.b64encode(hashlib.sha1(value.encode('utf-8')).digest())
    76 response_str = response_tpl % (ac.decode('utf-8'))
    77 # 响应【握手】信息
    78 conn.send(response_str.encode("utf8"))
    79 
    80 while True:
    81     msg = conn.recv(8096)
    82     print(msg)

    websocket解密浅谈

     1 # b'x81x83xceHxb6x85xffzx85'
     2 
     3 hashstr = b'x81x83xceHxb6x85xffzx85'
     4 # b'x81    x83    xceHxb6x85xffzx85'
     5 
     6 # 将第二个字节也就是 x83 第9-16位 进行与127进行位运算
     7 payload = hashstr[1] & 127
     8 print(payload)
     9 if payload == 127:
    10     extend_payload_len = hashstr[2:10]
    11     mask = hashstr[10:14]
    12     decoded = hashstr[14:]
    13 # 当位运算结果等于127时,则第3-10个字节为数据长度
    14 # 第11-14字节为mask 解密所需字符串
    15 # 则数据为第15字节至结尾
    16 
    17 if payload == 126:
    18     extend_payload_len = hashstr[2:4]
    19     mask = hashstr[4:8]
    20     decoded = hashstr[8:]
    21 # 当位运算结果等于126时,则第3-4个字节为数据长度
    22 # 第5-8字节为mask 解密所需字符串
    23 # 则数据为第9字节至结尾
    24 
    25 
    26 if payload <= 125:
    27     extend_payload_len = None
    28     mask = hashstr[2:6]
    29     decoded = hashstr[6:]
    30 
    31 # 当位运算结果小于等于125时,则这个数字就是数据的长度
    32 # 第3-6字节为mask 解密所需字符串
    33 # 则数据为第7字节至结尾
    34 
    35 str_byte = bytearray()
    36 
    37 for i in range(len(decoded)):
    38     byte = decoded[i] ^ mask[i % 4]
    39     str_byte.append(byte)
    40 
    41 print(str_byte.decode("utf8"))
    42 
    

    websocket加密浅谈

     1 import struct
     2 msg_bytes = "hello".encode("utf8")
     3 token = b"x81"
     4 length = len(msg_bytes)
     5 
     6 if length < 126:
     7     token += struct.pack("B", length)
     8 elif length == 126:
     9     token += struct.pack("!BH", 126, length)
    10 else:
    11     token += struct.pack("!BQ", 127, length)
    12 
    13 msg = token + msg_bytes
    14 
    15 print(msg)
    16 
    17 加密算法脑瓜疼
  • 相关阅读:
    十步完全理解SQL
    c#退出应用程序办法
    几个有意思的算法题
    GeoServer不同服务器安装配置、数据发布及客户端访问
    开启httpd服务的时候 显示Could not reliably determine the server`s fully qualified domain name
    Working With OpenLayers(Section 1: Creating a Basic Map)
    GeoServer地图开发解决方案(五):基于Silverlight技术的地图客户端实现
    模拟远程HTTP的POST请求
    模拟提交带附件的表单
    支付宝手机网站接口对接
  • 原文地址:https://www.cnblogs.com/kujiawei/p/10580618.html
Copyright © 2011-2022 走看看