IServerImpl.cpp 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850
  1. #include "StdAfx.h"
  2. #include "IServerImpl.h"
  3. #include <comdef.h>
  4. #include <atlbase.h>
  5. #include "ThreadPool.hpp"
  6. const int AF_IPV4 = 0;
  7. const int AF_IPV6 = 1;
  8. const int SOCK_TCP = SOCK_STREAM-1;
  9. const int SOCK_UDP = SOCK_DGRAM-1;
  10. namespace ServerSocketImpl
  11. {
  12. IServerImpl* g_pServerSocket[20] = {0};
  13. IServerImpl::IServerImpl():m_nMode(AF_IPV4)
  14. ,m_nSockType(SOCK_TCP)
  15. ,m_strPort(_T("64320"))
  16. ,m_nSocketIndex(0)
  17. {
  18. m_bStopbeat = FALSE;
  19. m_hRunObject = NULL;
  20. m_hClearInvalidateSocketThread = NULL;
  21. InitializeCriticalSection( &m_csProcessData );
  22. m_SocketServer.SetInterface(this);
  23. }
  24. IServerImpl::~IServerImpl()
  25. {
  26. m_SocketServer.Terminate();
  27. DeleteCriticalSection( &m_csProcessData );
  28. }
  29. BOOL IServerImpl::Initialize()
  30. {
  31. TCHAR szIPAddr[MAX_PATH] = { 0 };
  32. CSocketHandle::GetLocalAddress(szIPAddr, MAX_PATH, AF_INET);
  33. //AppendText(_T("Local Address (IPv4): %s\r\n"), szIPAddr);
  34. CSocketHandle::GetLocalAddress(szIPAddr, MAX_PATH, AF_INET6);
  35. //AppendText(_T("Local Address (IPv6): %s\r\n"), szIPAddr);
  36. return TRUE;
  37. }
  38. void IServerImpl::Start(IN LPCTSTR strPort,IN const int &nMode)
  39. {
  40. m_nMode = nMode;
  41. int nFamily = (m_nMode == AF_IPV4) ? AF_INET : AF_INET6;
  42. if (!m_SocketServer.StartServer(NULL, strPort, nFamily, (m_nSockType+1)))
  43. {
  44. AfxMessageBox(_T("Failed to start server."), NULL, MB_ICONSTOP);
  45. }
  46. else StartClearInvalidateSocketThread();
  47. //SyncControls();
  48. }
  49. void IServerImpl::Stop()
  50. {
  51. if(m_hRunObject)
  52. SetEvent(m_hRunObject);
  53. if( m_hClearInvalidateSocketThread )
  54. {
  55. if (WaitForSingleObject(m_hClearInvalidateSocketThread,INFINITE) != WAIT_FAILED)
  56. {
  57. CloseHandle(m_hClearInvalidateSocketThread);
  58. m_hClearInvalidateSocketThread = NULL;
  59. }
  60. }
  61. CloseHandle( m_hRunObject );
  62. m_hRunObject = NULL;
  63. m_SocketServer.Terminate();
  64. //SyncControls();
  65. }
  66. void IServerImpl::Send()
  67. {
  68. if ( m_SocketServer.IsOpen() )
  69. {
  70. CString strMsg;
  71. //m_ctlMessage.GetWindowText( strMsg );
  72. if ( strMsg.IsEmpty() )
  73. {
  74. //AppendText( _T("Please enter the message to send.\r\n") );
  75. return;
  76. }
  77. USES_CONVERSION;
  78. if (m_nSockType == SOCK_TCP)
  79. {
  80. const LPBYTE lpbData = (const LPBYTE)(T2CA(strMsg));
  81. // unsafe access to Socket list!
  82. #ifdef SOCKHANDLE_USE_OVERLAPPED
  83. const SocketBufferList& sl = m_SocketServer.GetSocketList();
  84. for(SocketBufferList::const_iterator citer = sl.begin(); citer != sl.end(); ++citer)
  85. #else
  86. const SocketList& sl = m_SocketServer.GetSocketList();
  87. for(SocketList::const_iterator citer = sl.begin(); citer != sl.end(); ++citer)
  88. #endif
  89. {
  90. CSocketHandle sockHandle;
  91. sockHandle.Attach( (*citer) );
  92. sockHandle.Write(lpbData, strMsg.GetLength(), NULL);
  93. sockHandle.Detach();
  94. }
  95. }
  96. else
  97. {
  98. SockAddrIn servAddr, sockAddr;
  99. m_SocketServer->GetSockName(servAddr);
  100. GetDestination(sockAddr);
  101. if ( servAddr != sockAddr )
  102. {
  103. m_SocketServer.Write((const LPBYTE)(T2CA(strMsg)), strMsg.GetLength(), sockAddr);
  104. }
  105. else
  106. {
  107. //AppendText( _T("Please change the port number to send message to a client.\r\n") );
  108. }
  109. }
  110. }
  111. else
  112. {
  113. AfxMessageBox(_T("Socket is not connected"));
  114. }
  115. }
  116. void IServerImpl::SendAll(CSocketHandle &sockHandle, unsigned char *pMsg, int nLength)
  117. {
  118. if ( m_SocketServer.IsOpen() )
  119. {
  120. USES_CONVERSION;
  121. if (m_nSockType == SOCK_TCP)
  122. {
  123. // unsafe access to Socket list!
  124. const LPBYTE lpbData = (const LPBYTE)(pMsg);
  125. sockHandle.Write(lpbData, nLength, NULL);
  126. }
  127. else
  128. {
  129. SockAddrIn servAddr, sockAddr;
  130. m_SocketServer->GetSockName(servAddr);
  131. GetDestination(sockAddr);
  132. if ( servAddr != sockAddr )
  133. {
  134. m_SocketServer.Write((const LPBYTE)*pMsg, nLength, sockAddr);
  135. }
  136. else
  137. {
  138. }
  139. }
  140. }
  141. else
  142. {
  143. }
  144. }
  145. void IServerImpl::ToprocessRecivebuf(IN SocketIOBuffer &sockHandle, IN const BYTE* pReceivebuf, IN DWORD dwReceiveSize)
  146. {
  147. DWORD dwIndexOfProcessed = 0; // 当前接收的包被处理的长度;
  148. DWORD dwOnceProcessedLen = 0; // 循环一次处理了多少当前包;
  149. STProtocolheader *pstProtocolheader;
  150. //LOG4C((LOG_NOTICE,"当前包大小:%d 内容:%s",dwReceiveSize,pReceivebuf));
  151. //LOG4C((LOG_NOTICE,"缓存包大小:%d,内容:%s",sockHandle.npendingSize,sockHandle.szpendingbuf));
  152. while( dwIndexOfProcessed < dwReceiveSize)
  153. {
  154. pstProtocolheader = NULL;
  155. dwOnceProcessedLen = 0;
  156. if ( sockHandle.npendingSize == 0) //----------------------------------------------// 1.第一次接收或完整组包后接收剩余包;
  157. {
  158. //LOG4C((LOG_NOTICE, "1.第一次接收或完整组包后接收剩余包"));
  159. pstProtocolheader = (STProtocolheader *)&((unsigned char *)pReceivebuf)[dwIndexOfProcessed];
  160. if( dwReceiveSize - dwIndexOfProcessed < sizeof(STProtocolheader) ) // 1.1.第一次接收或剩余数据不足一个包头;
  161. {
  162. //LOG4C((LOG_NOTICE, "1.1.第一次接收或剩余数据不足一个包头"));
  163. // 如果第一次接包就没有收够包头,认为是非法包,扔掉,就是说已处理的长度dwOnceProcessedLen = 0;
  164. sockHandle.npendingSize = dwReceiveSize - dwIndexOfProcessed;
  165. memcpy(sockHandle.szpendingbuf, pstProtocolheader, sockHandle.npendingSize);
  166. }
  167. else // 1.2.第一次接收或剩余数据大于一个包头;
  168. {
  169. //LOG4C((LOG_NOTICE, "1.2.第一次接收或剩余数据大于一个包头,协议包长度:%d",pstProtocolheader->nDataLen));
  170. dwOnceProcessedLen = pstProtocolheader->nDataLen;
  171. if( (int)pstProtocolheader->nDataLen > dwReceiveSize - dwIndexOfProcessed ) // 1.2.1.第一次接收或剩余数据不足一个完整的协议包;
  172. {//
  173. //LOG4C((LOG_NOTICE, "1.2.1.第一次接收或剩余数据不足一个完整的协议包"));
  174. memcpy(sockHandle.szpendingbuf, pstProtocolheader, dwReceiveSize - dwIndexOfProcessed);
  175. //如果第一次接包,pstProtocolheader->nDataLen大于当前包的总长,认为是非法包,扔掉(不处理这部分,不一定是非法包)
  176. // if( dwIndexOfProcessed == 0 )
  177. // {
  178. // //组包错误,则扔掉当前包
  179. // LOG4C((LOG_NOTICE, "第一次接包,服务器pstProtocolheader->nDataLen大于当前包的总长,认为是非法包,扔掉"));
  180. // }
  181. sockHandle.npendingSize = dwReceiveSize - dwIndexOfProcessed;
  182. dwOnceProcessedLen = dwReceiveSize - dwIndexOfProcessed; // 该次处理的数据长度;
  183. }
  184. else // ---------------------------------------------------------------------// 1.2.2.第一次接收或剩余数据大于一个完整的协议包;
  185. {
  186. //LOG4C((LOG_NOTICE, "1.2.2.第一次接收或剩余数据大于一个完整的协议包"));
  187. sockHandle.npendingSize = 0;
  188. //memset(sockHandle.szpendingbuf,0,SOCKET_BUFFSIZE);
  189. //dwOnceProcessedLen = pstProtocolheader->nDataLen; // 该次处理的数据长度;
  190. }
  191. }
  192. }
  193. else if( sockHandle.npendingSize > 0) //------------------------------------------------------------------------------// 2.第n+1次接收数据包;
  194. {
  195. pstProtocolheader = (STProtocolheader *)sockHandle.szpendingbuf;
  196. if( sockHandle.npendingSize < sizeof(STProtocolheader) ) // 2.1.pengingbuf数据小于包头
  197. {
  198. //LOG4C((LOG_NOTICE,"2.1.pengingbuf数据小于包头"));
  199. DWORD dwRestheader = sizeof(STProtocolheader) - sockHandle.npendingSize;
  200. if( dwRestheader < dwReceiveSize ) // 2.1.1.当前包大小 > 剩下包头长度,可以组成一个完整包头;
  201. {
  202. //LOG4C((LOG_NOTICE,"2.1.1.当前包大小 > 剩下包头长度,可以组成一个完整包头"));
  203. // -1.先收完一个完整的包头;
  204. memcpy( &sockHandle.szpendingbuf[sockHandle.npendingSize], pReceivebuf, dwRestheader);
  205. //LOG4C((LOG_NOTICE,"2.1.1.当前包大小 > 剩下包头长度,可以组成一个完整包头,协议包长度:%d",pstProtocolheader->nDataLen));
  206. // -2.处理剩余数据;
  207. dwOnceProcessedLen = pstProtocolheader->nDataLen - sockHandle.npendingSize;
  208. if( dwOnceProcessedLen <= dwReceiveSize ) // 2.1.1.1.可以组成一个完整的协议包;
  209. {
  210. //LOG4C((LOG_NOTICE,"2.1.1.1.可以组成一个完整的协议包"));
  211. memcpy( &sockHandle.szpendingbuf[sizeof(STProtocolheader)],
  212. &((char *)pReceivebuf)[dwRestheader],
  213. pstProtocolheader->nDataLen - sizeof(STProtocolheader));
  214. }
  215. else // 2.1.1.2.未能组成一个完整的协议包,断续接收等待;
  216. {
  217. //int nTemp = dwReceiveSize - dwRestheader; //除去头剩余部分的长度
  218. //if ( nTemp > 0 ) //刚好是Header的长度,不用拷贝内存,所以这里加了>0的判断
  219. //{
  220. //memcpy( &pSockHandle->m_szpendingbuf[sizeof(STProtocolheader)],&((char *)pReceivebuf)[dwRestheader],nTemp );
  221. //}
  222. //LOG4C((LOG_NOTICE,"2.1.1.2.未能组成一个完整的协议包,断续接收等待"));
  223. memcpy( &sockHandle.szpendingbuf[sizeof(STProtocolheader)],&((char *)pReceivebuf)[dwRestheader],dwReceiveSize - dwRestheader);
  224. sockHandle.npendingSize += dwReceiveSize;
  225. }
  226. }
  227. else //------------------------------------------------------// 2.1.2.当前包大小 <= 剩下包头长度,未能或刚好组成一个完整的包头;
  228. {
  229. //LOG4C((LOG_NOTICE,"2.1.2.当前包大小 <= 剩下包头长度,未能或刚好组成一个完整的包头"));
  230. memcpy( &sockHandle.szpendingbuf[sockHandle.npendingSize], pReceivebuf, dwReceiveSize );
  231. sockHandle.npendingSize += dwReceiveSize;
  232. dwOnceProcessedLen = dwReceiveSize;
  233. }
  234. }
  235. else // --------------------------------------------------------// 2.2.pengingbuf数据大于包头;
  236. {
  237. dwOnceProcessedLen = pstProtocolheader->nDataLen - sockHandle.npendingSize;
  238. if ( dwOnceProcessedLen <= dwReceiveSize ) // 可以组成一个完整的协议包;
  239. {
  240. //LOG4C((LOG_NOTICE,"2.2.1.可以组成一个完整的协议包"));
  241. memcpy( &sockHandle.szpendingbuf[sockHandle.npendingSize], pReceivebuf, dwOnceProcessedLen );
  242. sockHandle.npendingSize = 0;
  243. //memset(sockHandle.szpendingbuf,0,SOCKET_BUFFSIZE);
  244. }
  245. else // 未能组成一个完整协议包;
  246. {
  247. //LOG4C((LOG_NOTICE,"2.2.2.未能组成一个完整协议包"));
  248. memcpy( &sockHandle.szpendingbuf[sockHandle.npendingSize], pReceivebuf, dwReceiveSize );
  249. sockHandle.npendingSize += dwReceiveSize;
  250. }
  251. }
  252. }
  253. //LOG4C((LOG_NOTICE,"*********%d,%s",sockHandle.npendingSize,sockHandle.szpendingbuf));
  254. if ( dwOnceProcessedLen == 0 )
  255. {
  256. // 没有收够包头,认为是非法包,扔掉
  257. LOG4C((LOG_NOTICE, "*****没有收够包头,认为是非法包,扔掉"));
  258. break;
  259. }
  260. if ( sockHandle.npendingSize == 0 )
  261. {
  262. //LOG4C((LOG_NOTICE, "ok.处理完整协议包的解析工作"));
  263. if ( pstProtocolheader->nDataLen > SOCKET_BUFFSIZE )
  264. {
  265. // 包长度超过限制,暂时不处理;
  266. LOG4C((LOG_NOTICE, "pstProtocolheader->nDataLen超过限制"));
  267. }
  268. if(-1 == OnIntegrityPacket(sockHandle, pstProtocolheader))
  269. {
  270. LOG4C((LOG_NOTICE, "Error OnIntegrityPacket"));
  271. break;
  272. }
  273. }
  274. //LOG4C((LOG_NOTICE,"//////////%d,%s",sockHandle.npendingSize,sockHandle.szpendingbuf));
  275. dwIndexOfProcessed += dwOnceProcessedLen;
  276. }
  277. }
  278. int IServerImpl::OnIntegrityPacket(IN SocketIOBuffer &sockHandle, IN void *pIntegrityPacket)
  279. {
  280. STProtocolheader *pHeader = (STProtocolheader *)pIntegrityPacket;
  281. if( pHeader == NULL )
  282. {
  283. LOG4C((LOG_NOTICE,"pHeader == NULL"));
  284. return -1;
  285. }
  286. if( pHeader->bof != PBOF)
  287. {
  288. LOG4C((LOG_NOTICE,"协议头标识错误"));
  289. return -1;
  290. }
  291. //if( pHeader->nDataLen < 0 || pHeader->nDataLen > 65535 )
  292. if( pHeader->nDataLen < 0 || pHeader->nDataLen > 1024*1024 )
  293. {
  294. LOG4C((LOG_NOTICE,"协议长度越界错误"));
  295. return -1;
  296. }
  297. unsigned int tmp = VerifyIntegrityPacket(pHeader, pHeader->nDataLen);
  298. //LOG4C((LOG_NOTICE,"协议标识:%d,协议命令:%d,协议类型:%d,协议长度:%d,协议校验:%d",pHeader->bof,pHeader->nCmd,pHeader->nCmdType,pHeader->nDataLen,pHeader->nVerify));
  299. //unsigned char *pBody = &((unsigned char*)pIntegrityPacket)[sizeof(STProtocolheader)];
  300. //LOG4C((LOG_NOTICE,"内容:%s",pBody));
  301. if(tmp != pHeader->nVerify)
  302. {
  303. LOG4C((LOG_NOTICE,"协议校验值错误:len=%d,%d != %d",pHeader->nDataLen,tmp,pHeader->nVerify));
  304. return -1;
  305. }
  306. switch (pHeader->nCmd)
  307. {
  308. case CMD_HEART: // 公共命令:心跳包
  309. {
  310. // 心跳包,不处理任务事务;
  311. //LOG4C((LOG_NOTICE,"接收到的心跳包"));
  312. }
  313. break;
  314. case CMD_TOCHAT: // 公共命令:文字聊天;
  315. {
  316. STChatbody *tChatbody = (STChatbody*)pIntegrityPacket;
  317. //TRACE("------------------");
  318. //AfxMessageBox(tChatbody->szChat);
  319. //LOG4C((LOG_NOTICE,"聊天内容:%s",tChatbody->szChat));
  320. }
  321. break;
  322. case CMD_FILEINFO_TRANSFER: // 公共命令:文件传输;
  323. {
  324. //LOG4C((LOG_NOTICE,"文件信息传输"));
  325. // 需要向客户端返回本地文件的信息:
  326. // 1.若不存在指定文件名,则返回FileSeek = 0;(文件位置指针)
  327. // 2.若文件存在,则读取文件大小,如果文件大小 == 客户端文件大小,表示已有完整文件,不进行传输;
  328. // 3.若文件存在,但文件大小 < 客户端文件大小,认为没有传守文件,继传。
  329. // 4.若文件存在,但文件大小 > 客户端文件大小,先删除本地文件,再与1相同处理。
  330. // 服务端要维护一个文件列表,用于记录客户端需要传输的文件;
  331. // 客户端同样维护一个文件列表,用于记录要传输的文件;
  332. // 两边文件列表一致;
  333. g_dwRecived = 0;
  334. if ( g_pSTFileInfobody == NULL )
  335. {
  336. g_pSTFileInfobody = new STFileInfobody();
  337. }
  338. memset(g_pSTFileInfobody,0,sizeof(STFileInfobody));
  339. memcpy(g_pSTFileInfobody,pIntegrityPacket,sizeof(STFileInfobody));
  340. //g_pSTFileInfobody = (STFileInfobody*)pIntegrityPacket;
  341. LOG4C((LOG_NOTICE,"%d:%d:%d:%d:%d, %s:%d:%d:%d",
  342. g_pSTFileInfobody->tPHeader.bof,
  343. g_pSTFileInfobody->tPHeader.nCmd,
  344. g_pSTFileInfobody->tPHeader.nCmdType,
  345. g_pSTFileInfobody->tPHeader.nDataLen,
  346. g_pSTFileInfobody->tPHeader.nVerify,
  347. g_pSTFileInfobody->szFileName,
  348. g_pSTFileInfobody->nFileLength,
  349. g_pSTFileInfobody->tCreateDate,
  350. g_pSTFileInfobody->tModifyDate));
  351. TCHAR szFileFullName[MAX_PATH] = _T("");
  352. sprintf(szFileFullName,"%s\%s",g_ModulePath,g_pSTFileInfobody->szFileName);
  353. memcpy(g_pSTFileInfobody->szFileName,szFileFullName,MAX_PATH);
  354. LOG4C((LOG_NOTICE,"文件名:%s",g_pSTFileInfobody->szFileName));
  355. }
  356. break;
  357. case CMD_FILECONT_TRANSFER:
  358. {
  359. //LOG4C((LOG_NOTICE,"文件内容传输"));
  360. // 文件传输需要单独出一个端口来独立完成,且只接收客户端排队文件传输。
  361. if ( g_pSTFileInfobody == NULL )
  362. {
  363. LOG4C((LOG_NOTICE,"接收文件信息失败"));
  364. return 0;
  365. }
  366. CFile file;
  367. CFileException e;
  368. file.Open(g_pSTFileInfobody->szFileName, CFile::modeNoTruncate|CFile::modeWrite|CFile::modeCreate|CFile::shareExclusive, &e);
  369. if (e.m_cause != 0)
  370. {
  371. DWORD dw = GetLastError();
  372. LOG4C((LOG_NOTICE,"创建或打开文件失败:%d",dw)); // dw = 53,表示写文件的速度还不及收的速度快。上次未写完,这次又要开始打开文件写.
  373. file.Close();
  374. return -1;
  375. }
  376. STFileContextbody *pFileContextbody = (STFileContextbody*)pIntegrityPacket;
  377. //__int64 nTotal = 0;
  378. //while( g_dwRecived < g_STFileInfobody.nFileLength )
  379. //{
  380. file.SeekToEnd();
  381. file.Write(pFileContextbody->szFileContext, pFileContextbody->nFileContextLen);
  382. g_dwRecived += pHeader->nDataLen;
  383. //}
  384. file.Close();
  385. //CFile::SetStatus(xInfo.szFileName,xInfo.fStat);
  386. }
  387. break;
  388. case C2LCMD_REQ_LOGIN:
  389. {
  390. // 1.判断登录信息(加密狗信息);
  391. // 2.信息从数据库中获取,比对正常允许通信;
  392. // **3.若信息比对失败,断开连接;
  393. // 3.若信息比对失败,允许连接,但不返回数据库信息;
  394. // 本端可对其进行控制。
  395. }
  396. break;
  397. case C2CCMD_REQ_LOGIN:
  398. {
  399. // 1.判断登录信息(账号+密码);
  400. // 2.信息从数据库中获取,比对正常允许通信,并返回数据库信息;
  401. // 3.若信息比对失败,断开连接;
  402. STAccountInfobody *tAccountInfobody = (STAccountInfobody*)pIntegrityPacket;
  403. if ( (strcmp(tAccountInfobody->szAccount,"admin") == 0) && (strcmp(tAccountInfobody->szPassword,"admin123456") == 0) )
  404. {
  405. TRACE("账号信息完全匹配");
  406. LOG4C((LOG_NOTICE,"账号信息完全匹配"));
  407. // 临时步骤,数据库信息应该做为全局变量保存; g_STDatabaseInfobody;
  408. STDatabaseInfobody tDatabaseInfobody;
  409. // ....配置好数据库信息;
  410. // ....................
  411. strcpy(tDatabaseInfobody.szDatabaseServer,"127.0.0.1");
  412. strcpy(tDatabaseInfobody.szDatabaseTCPPort,"1433");
  413. strcpy(tDatabaseInfobody.szDatabaseAccount,"sa");
  414. strcpy(tDatabaseInfobody.szDatabasePassword,"ly1234");
  415. strcpy(tDatabaseInfobody.szDatabaseName,"db");
  416. tDatabaseInfobody.GetVerify();
  417. //m_SocketServer->Write();
  418. CSocketHandle tSockhandle;
  419. tSockhandle.Attach(sockHandle);
  420. m_bStopbeat = TRUE;//停止心跳包;
  421. if( -1 == tSockhandle.Write((const LPBYTE)(&tDatabaseInfobody), tDatabaseInfobody.tPHeader.nDataLen, NULL))
  422. {
  423. // 发送失败;
  424. LOG4C((LOG_NOTICE,"发送失败ooo"));
  425. tSockhandle.Detach();
  426. }
  427. tSockhandle.Detach();
  428. m_bStopbeat = FALSE;//恢复心跳包;
  429. }
  430. else
  431. {
  432. TRACE("账号或密码错误");
  433. LOG4C((LOG_NOTICE,"账号或密码错误,关闭该套接字,拒绝连接"));
  434. // 关闭该套接字,拒绝连接;
  435. CSocketHandle::ShutdownConnection(sockHandle);
  436. }
  437. }
  438. break;
  439. default: return 0;
  440. }
  441. memset(sockHandle.szpendingbuf,0,SOCKET_BUFFSIZE);
  442. return 0;
  443. }
  444. // unsigned int IServerImpl::VerityIntegrityPacket(IN void *pIntegrityPacket,unsigned int nPacketSize)
  445. // {
  446. // unsigned int checksum = 0;
  447. // unsigned char *pBody = &((unsigned char*)pIntegrityPacket)[sizeof(STProtocolheader)];
  448. //
  449. // if( pBody )
  450. // checksum = crc32( 0, pBody, nPacketSize );
  451. //
  452. // return checksum;
  453. // }
  454. void IServerImpl::GetAddress(const SockAddrIn& addrIn, CString& rString) const
  455. {
  456. TCHAR szIPAddr[MAX_PATH] = { 0 };
  457. CSocketHandle::FormatIP(szIPAddr, MAX_PATH, addrIn);
  458. rString.Format(_T("%s : %d"), szIPAddr, static_cast<int>(static_cast<UINT>(ntohs(addrIn.GetPort()))) );
  459. }
  460. void IServerImpl::AppendText(LPCTSTR lpszFormat, ...)
  461. {
  462. // if ( !::IsWindow(m_ctlMsgList.GetSafeHwnd()) ) return;
  463. // TCHAR szBuffer[512];
  464. // HWND hWnd = m_ctlMsgList.GetSafeHwnd();
  465. // DWORD dwResult = 0;
  466. // if (SendMessageTimeout(hWnd, WM_GETTEXTLENGTH, 0, 0, SMTO_NORMAL, 500L, &dwResult) != 0)
  467. // {
  468. // int nLen = (int) dwResult;
  469. // if (SendMessageTimeout(hWnd, EM_SETSEL, nLen, nLen, SMTO_NORMAL, 500L, &dwResult) != 0)
  470. // {
  471. // size_t cb = 0;
  472. // va_list args;
  473. // va_start(args, lpszFormat);
  474. // ::StringCchVPrintfEx(szBuffer, 512, NULL, &cb, 0, lpszFormat, args);
  475. // va_end(args);
  476. // SendMessageTimeout(hWnd, EM_REPLACESEL, FALSE, reinterpret_cast<LPARAM>(szBuffer), SMTO_NORMAL, 500L, &dwResult);
  477. // }
  478. // }
  479. }
  480. bool IServerImpl::GetDestination(SockAddrIn& addrIn) const
  481. {
  482. CString strPort;
  483. //GetDlgItemText(IDC_SVR_PORT, strPort);
  484. int nFamily = (m_nMode == AF_IPV4) ? AF_INET : AF_INET6;
  485. return addrIn.CreateFrom(NULL, strPort, nFamily);
  486. }
  487. bool IServerImpl::SetupMCAST()
  488. {
  489. const TCHAR szIPv4MCAST[] = TEXT("239.121.1.2");
  490. const TCHAR szIPv6MCAST[] = TEXT("FF02:0:0:0:0:0:0:1"); // All Nodes local address
  491. bool result = false;
  492. if ( m_nSockType == SOCK_UDP )
  493. {
  494. if ( m_nMode == AF_IPV4 ) {
  495. result = m_SocketServer->AddMembership(szIPv4MCAST, NULL);
  496. } else {
  497. result = m_SocketServer->AddMembership(szIPv6MCAST, NULL);
  498. HRESULT hr = HRESULT_FROM_WIN32(GetLastError());
  499. hr = hr;
  500. }
  501. }
  502. return result;
  503. }
  504. ///////////////////////////////////////////////////////////////////////////////
  505. void IServerImpl::OnThreadBegin(CSocketHandle* pSH)
  506. {
  507. ASSERT( pSH == m_SocketServer );
  508. (pSH);
  509. CString strAddr;
  510. SockAddrIn sockAddr;
  511. m_SocketServer->GetSockName(sockAddr);
  512. GetAddress( sockAddr, strAddr );
  513. //AppendText( _T("Server Running on: %s\r\n"), strAddr);
  514. }
  515. void IServerImpl::OnThreadExit(CSocketHandle* pSH)
  516. {
  517. ASSERT( pSH == m_SocketServer );
  518. (pSH);
  519. //AppendText( _T("Server Down!\r\n"));
  520. }
  521. void IServerImpl::OnConnectionFailure(CSocketHandle* pSH, SOCKET newSocket)
  522. {
  523. ASSERT( pSH == m_SocketServer );
  524. (pSH);
  525. CString strAddr;
  526. CSocketHandle sockHandle;
  527. SockAddrIn sockAddr;
  528. if (newSocket != INVALID_SOCKET)
  529. {
  530. sockHandle.Attach( newSocket );
  531. sockHandle.GetPeerName( sockAddr );
  532. GetAddress( sockAddr, strAddr );
  533. sockHandle.Close();
  534. //AppendText( _T("Connection abandoned: %s\r\n"), strAddr );
  535. LOG4C((LOG_NOTICE,"Connection abandoned:%s",strAddr));
  536. }
  537. else
  538. {
  539. //AppendText( _T("Connection abandoned. Not a valid socket.\r\n"), strAddr );
  540. LOG4C((LOG_NOTICE,"Connection abandoned. Not a valid socket:%s",strAddr));
  541. }
  542. }
  543. void IServerImpl::OnAddConnection(CSocketHandle* pSH, SOCKET newSocket)
  544. {
  545. ASSERT( pSH == m_SocketServer );
  546. (pSH);
  547. CString strAddr;
  548. CSocketHandle sockHandle;
  549. SockAddrIn sockAddr;
  550. sockHandle.Attach( newSocket );
  551. sockHandle.GetPeerName( sockAddr );
  552. GetAddress( sockAddr, strAddr );
  553. sockHandle.Detach();
  554. //LOG4C((LOG_NOTICE,"新的连接接入:%s",strAddr));
  555. //AppendText( _T("Connection established: %s\r\n"), strAddr );
  556. }
  557. // void IServerImpl::OnDataReceived(CSocketHandle* pSH, const BYTE* pbData, DWORD dwCount, const SockAddrIn& addr)
  558. // {
  559. // ASSERT( pSH == m_SocketServer );
  560. // (pSH);
  561. // CString strAddr, strText;
  562. // USES_CONVERSION;
  563. // LPTSTR pszText = strText.GetBuffer(dwCount+1);
  564. // ::StringCchCopyN(pszText, dwCount+1, A2CT(reinterpret_cast<LPCSTR>(pbData)), dwCount);
  565. // strText.ReleaseBuffer();
  566. // GetAddress( addr, strAddr );
  567. // AppendText( _T("%s>(%s)\r\n"), strAddr, strText);
  568. //
  569. // if (m_nSockType == SOCK_TCP)
  570. // {
  571. // // unsafe access to Socket list!
  572. //#ifdef SOCKHANDLE_USE_OVERLAPPED
  573. // const SocketBufferList& sl = m_SocketServer.GetSocketList();
  574. // for(SocketBufferList::const_iterator citer = sl.begin(); citer != sl.end(); ++citer)
  575. //#else
  576. // const SocketList& sl = m_SocketServer.GetSocketList();
  577. // for(SocketList::const_iterator citer = sl.begin(); citer != sl.end(); ++citer)
  578. //#endif
  579. // {
  580. // EnterCriticalSection( &m_csProcessData );
  581. //#if 0
  582. // CSocketHandle sockHandle;
  583. // sockHandle.m_npendingSize = 0;
  584. // memset(sockHandle.m_szpendingbuf, 0, SOCKET_BUFFSIZE);
  585. // sockHandle.Attach( (*citer) );
  586. // SockAddrIn sockAddr;
  587. // sockHandle.GetPeerName(sockAddr);
  588. // if( sockAddr == addr )
  589. // {
  590. // ToprocessRecivebuf(sockHandle,pbData,dwCount);
  591. // }
  592. // sockHandle.Detach();
  593. //#else
  594. // if ( addr == SockAddrIn(*citer))
  595. // {
  596. // ToprocessRecivebuf(*citer,pbData,dwCount);
  597. // }
  598. //#endif
  599. // LeaveCriticalSection( &m_csProcessData );
  600. // }
  601. // }
  602. // else
  603. // {
  604. // SockAddrIn servAddr, sockAddr;
  605. // m_SocketServer->GetSockName(servAddr);
  606. // GetDestination(sockAddr);
  607. // if ( servAddr != sockAddr )
  608. // {
  609. // //m_SocketServer.Write((const LPBYTE)(T2CA(strMsg)), strMsg.GetLength(), sockAddr);
  610. // } else
  611. // {
  612. // //AppendText( _T("Please change the port number to send message to a client.\r\n") );
  613. // }
  614. // }
  615. // }
  616. void IServerImpl::OnDataReceived(CSocketHandle* pSH, const BYTE* pbData, DWORD dwCount, const SockAddrIn& addr)
  617. {
  618. ASSERT( pSH == m_SocketServer );
  619. (pSH);
  620. CString strAddr, strText;
  621. USES_CONVERSION;
  622. LPTSTR pszText = strText.GetBuffer(dwCount+1);
  623. ::StringCchCopyN(pszText, dwCount+1, A2CT(reinterpret_cast<LPCSTR>(pbData)), dwCount);
  624. strText.ReleaseBuffer();
  625. GetAddress( addr, strAddr );
  626. AppendText( _T("%s>(%s)\r\n"), strAddr, strText);
  627. if (m_nSockType == SOCK_TCP)
  628. {
  629. // unsafe access to Socket list!
  630. #ifdef SOCKHANDLE_USE_OVERLAPPED
  631. const SocketBufferList& sl = m_SocketServer.GetSocketList();
  632. for(SocketBufferList::const_iterator citer = sl.begin(); citer != sl.end(); ++citer)
  633. #else
  634. const SocketList& sl = m_SocketServer.GetSocketList();
  635. for(SocketList::const_iterator citer = sl.begin(); citer != sl.end(); ++citer)
  636. #endif
  637. {
  638. EnterCriticalSection( &m_csProcessData );
  639. if ( addr == SockAddrIn(*citer))
  640. {
  641. ToprocessRecivebuf((SocketIOBuffer&)*citer,pbData,dwCount);
  642. }
  643. LeaveCriticalSection( &m_csProcessData );
  644. }
  645. }
  646. else
  647. {
  648. SockAddrIn servAddr, sockAddr;
  649. m_SocketServer->GetSockName(servAddr);
  650. GetDestination(sockAddr);
  651. if ( servAddr != sockAddr )
  652. {
  653. //m_SocketServer.Write((const LPBYTE)(T2CA(strMsg)), strMsg.GetLength(), sockAddr);
  654. } else
  655. {
  656. //AppendText( _T("Please change the port number to send message to a client.\r\n") );
  657. }
  658. }
  659. }
  660. void IServerImpl::OnConnectionDropped(CSocketHandle* pSH)
  661. {
  662. ASSERT( pSH == m_SocketServer );
  663. (pSH);
  664. //AppendText( _T("Connection lost with client.\r\n") );
  665. LOG4C((LOG_NOTICE,"Connection lost with client"));
  666. }
  667. void IServerImpl::OnConnectionError(CSocketHandle* pSH, DWORD dwError)
  668. {
  669. ASSERT( pSH == m_SocketServer );
  670. (pSH);
  671. _com_error err(dwError);
  672. //AppendText( _T("Communication Error:\r\n%s\r\n"), err.ErrorMessage() );
  673. LOG4C((LOG_NOTICE,"Communication Error:%s",err.ErrorMessage()));
  674. }
  675. #if defined(SOCKHANDLE_USE_OVERLAPPED)
  676. void IServerImpl::OnRemoveConnection(CSocketHandle* pSH, SOCKET dropSocket)
  677. {
  678. return ;
  679. ASSERT( pSH == m_SocketServer );
  680. (pSH);
  681. CString strAddr;
  682. CSocketHandle sockHandle;
  683. SockAddrIn sockAddr;
  684. sockHandle.Attach( dropSocket );
  685. sockHandle.GetPeerName( sockAddr );
  686. GetAddress( sockAddr, strAddr );
  687. sockHandle.Detach();
  688. LOG4C((LOG_NOTICE,"删除无效连接:%s",strAddr));
  689. }
  690. #endif
  691. DWORD IServerImpl::GetClientConnectCount()
  692. {
  693. //DWORD dwClientSize = 0;
  694. //m_SocketServer->GetConnectionCount();
  695. return m_SocketServer.GetConnectionCount();
  696. }
  697. void IServerImpl::StartClearInvalidateSocketThread()
  698. {
  699. m_hRunObject = CreateEvent( NULL, TRUE, FALSE, "ClearInvalidateSocketThread" );
  700. if ( m_hRunObject == NULL )
  701. {
  702. LOG4C((LOG_NOTICE,"创建事件失败"));
  703. }
  704. m_hClearInvalidateSocketThread = CreateThread(NULL,0,ClearInvalidateSocketThread,this,0,NULL);
  705. if ( m_hClearInvalidateSocketThread == NULL )
  706. {
  707. LOG4C((LOG_NOTICE,"创建线程失败"));
  708. }
  709. }
  710. DWORD WINAPI IServerImpl::ClearInvalidateSocketThread(void *pInstance)
  711. {
  712. LOG4C((LOG_NOTICE,"服务端心跳检测线程"));
  713. IServerImpl *pServerImpl = (IServerImpl*)pInstance;
  714. #ifdef SOCKHANDLE_USE_OVERLAPPED
  715. /*const*/ SocketBufferList& sl = pServerImpl->m_SocketServer.GetClientSocketList();
  716. SocketBufferList::const_iterator citer = sl.begin();
  717. #else
  718. /*const*/ SocketList& sl = pServerImpl->m_SocketServer.GetClientSocketList();
  719. SocketList::const_iterator citer = sl.begin();
  720. #endif
  721. #if 0
  722. STProtocolheader tProtocolheader;
  723. tProtocolheader.nVerify = VerityIntegrityPacket(&tProtocolheader, sizeof(STProtocolheader));
  724. #else
  725. STChatbody tChatbody;
  726. memset(tChatbody.szChat,97,MAX_CHATLENGTH);
  727. //tChatbody.tPHeader.nVerify = VerifyIntegrityPacket(&tChatbody, sizeof(STChatbody));
  728. tChatbody.GetVerify();
  729. #endif
  730. //SockAddrIn sockAddr;
  731. //size_t nSize = sl.size();
  732. CSocketHandle tSocketHandle;
  733. do
  734. {
  735. //nSize = sl.size();
  736. if ( !pServerImpl->m_bStopbeat )
  737. {
  738. //AutoThreadSection aSenction(pServerImpl->m_SocketServer.ReturnSection());
  739. //if( (nSize != 0) && (citer != sl.end()))
  740. if ( citer != sl.end())
  741. {
  742. tSocketHandle.Attach( (*citer) );
  743. //if( -1 == tSocketHandle.Write((const LPBYTE)(&tProtocolheader), tProtocolheader.nDataLen, sockAddr))
  744. //if( -1 == tSocketHandle.Write((const LPBYTE)(&tProtocolheader), tProtocolheader.nDataLen, NULL))
  745. if( -1 == tSocketHandle.Write((const LPBYTE)(&tChatbody), tChatbody.tPHeader.nDataLen, NULL))
  746. {
  747. CString strAddr;
  748. SockAddrIn sockAddr = SockAddrIn(*citer);
  749. pServerImpl->GetAddress( sockAddr, strAddr );
  750. tSocketHandle.Close();
  751. citer = sl.erase(citer);
  752. tSocketHandle.Detach();
  753. LOG4C((LOG_NOTICE,"服务端成功删除无效SOCKET:%s",strAddr));
  754. continue;
  755. }
  756. else
  757. {
  758. citer++;
  759. }
  760. tSocketHandle.Detach();
  761. }
  762. else if ( citer == sl.end() )
  763. {
  764. citer = sl.begin();
  765. }
  766. }
  767. } while (WaitForSingleObject(pServerImpl->m_hRunObject,10L) == WAIT_TIMEOUT);
  768. return 0;
  769. }
  770. };