TcpParse.cpp 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. #include "stdafx.h"
  2. #include "Client2SrvType.h"
  3. #include "TcpParse.h"
  4. #include "crc32.h"
  5. #include "SocketHandle.h"
  6. #include "Global.h"
  7. CStringArray g_saAllData;
  8. //判断是否已经插入
  9. bool IsExistInsert( CString sData )
  10. {
  11. bool bRet = false;
  12. CString str;
  13. int nSize = g_saAllData.GetCount();
  14. for( int i=0;i<nSize;i++ )
  15. {
  16. str = g_saAllData.GetAt( i );
  17. if( str==sData )
  18. {
  19. bRet = true;
  20. break;
  21. }
  22. }
  23. if( !bRet )
  24. g_saAllData.Add( sData );
  25. return bRet;
  26. }
  27. CTcpParse::CTcpParse(void)
  28. {
  29. }
  30. CTcpParse::~CTcpParse(void)
  31. {
  32. }
  33. unsigned int CTcpParse::CalcCheckSum( void *pData, unsigned int nSize )
  34. {
  35. unsigned int checksum = 0;
  36. if ( nSize <= sizeof( ProtocolHeader ) )
  37. {
  38. return 0;
  39. }
  40. unsigned char *pBody = &( ( unsigned char* )pData )[ sizeof( ProtocolHeader ) ];
  41. nSize -= sizeof( ProtocolHeader );
  42. checksum = crc32( 0, pBody, nSize );
  43. return checksum;
  44. }
  45. void CTcpParse::ProcessHeart(void *pSocketHandle, void *pData, int nLen)
  46. {
  47. ((CSocketHandle *)pSocketHandle)->Write((const LPBYTE)pData, nLen, NULL);
  48. }
  49. void CTcpParse::ProcessReadSingleVarData(void *pSocketHandle, void *pData, int nLen)
  50. {
  51. RomoteDBData *pTmp = (RomoteDBData *)pData;
  52. //CHAR szID[MAX_ID] = {0};
  53. //int nRet = CDBInterface::GetInstancePtr()->GetSummaryInfo((char *)(LPCTSTR)pTmp->sDevUid,
  54. // (char *)(LPCTSTR)pTmp->sVarName,szID);
  55. CString sData;
  56. sData.Format( "%s %s",pTmp->sDevUid,pTmp->sVarName );
  57. if( IsExistInsert(sData) )
  58. {
  59. CDBInterface::GetInstancePtr()->EditSummaryRecord(
  60. (char *)pTmp->sDevNmae,
  61. (char *)pTmp->sTime,
  62. "",
  63. (char *)pTmp->sDesc,
  64. pTmp->Data,
  65. (char *)pTmp->sDevUid,
  66. (char *)pTmp->sVarName
  67. );
  68. }
  69. else
  70. {
  71. CDBInterface::GetInstancePtr()->InsertSummaryRecord(
  72. (char *)pTmp->sDevNmae,
  73. (char *)pTmp->sTime,
  74. "",
  75. (char *)pTmp->sDesc,
  76. pTmp->Data,
  77. (char *)pTmp->sDevUid,
  78. (char *)pTmp->sVarName
  79. );
  80. }
  81. }
  82. int CTcpParse::OnCmdProcess(void *pSocketHandle, void *pData)
  83. {
  84. ProtocolHeader *pHeader = (ProtocolHeader *)pData;
  85. if( pHeader == NULL ) return -1;
  86. if( pHeader->nLen < 0 || pHeader->nLen > 65535 ) return -1;
  87. unsigned int tmp = CalcCheckSum(pHeader, pHeader->nLen);
  88. if( tmp != pHeader->Verify )
  89. {
  90. return -1;
  91. }
  92. switch( pHeader->nCmd )
  93. {
  94. case CMD_READ_SINGLE_VAR_DATA: // 请求单个变量内容回应
  95. ProcessReadSingleVarData(pSocketHandle, pData, pHeader->nLen);
  96. break;
  97. }
  98. return 0;
  99. }
  100. void CTcpParse::ProcessData(void *pSocketHandle, const BYTE* pData, DWORD nLen)
  101. {
  102. DWORD nBuffIndex = 0;
  103. CSocketHandle* pSH = (CSocketHandle *)pSocketHandle;
  104. EnterCriticalSection( &(pSH->m_hClient2SrvSection) );
  105. while( nBuffIndex < nLen )
  106. {
  107. //LOG4C((LOG_NOTICE, "接收长度=%d, 处理长度=%d, PendingSize=%d", nLen, nBuffIndex, pSH->m_nPendingSize));
  108. ProtocolHeader *pHeader; //当前协议包头
  109. DWORD nProcessedLen = 0; //当前循环处理了多少个字节
  110. if( pSH->m_nPendingSize > 0 ) // 开始组包
  111. {
  112. //LOG4C((LOG_NOTICE, "开始组包"));
  113. pHeader = (ProtocolHeader *)pSH->m_PendingBuffer;
  114. if( pSH->m_nPendingSize < sizeof(ProtocolHeader) ) //上一次接收到的长度小于包头
  115. {
  116. DWORD nLinkHeaderLen = sizeof( ProtocolHeader ) - pSH->m_nPendingSize;
  117. if( nLinkHeaderLen <= nLen ) //这次可以收完包头
  118. {
  119. memcpy( &pSH->m_PendingBuffer[ pSH->m_nPendingSize ], pData, nLinkHeaderLen ); //这里已经收完Header
  120. nProcessedLen = pHeader->nLen - pSH->m_nPendingSize;
  121. if( nProcessedLen <= nLen ) //如果所需处理的长度小于等于当前包长度
  122. {
  123. memcpy( &pSH->m_PendingBuffer[ sizeof( ProtocolHeader ) ],
  124. & ( ( char *) pData )[ nLinkHeaderLen ],
  125. pHeader->nLen - sizeof( ProtocolHeader ) );
  126. //LOG4C((LOG_NOTICE, "收完所需的包"));
  127. pSH->m_nPendingSize = 0; // 收完所需的包,置m_nPendingSize为0
  128. }
  129. else
  130. {
  131. int nTemp = nLen - nLinkHeaderLen; //除去头剩余部分的长度
  132. if ( nTemp > 0 ) //刚好是Header的长度,不用拷贝内存,所以这里加了>0的判断
  133. {
  134. memcpy( &pSH->m_PendingBuffer[ sizeof( ProtocolHeader ) ],
  135. & ( ( char *) pData )[ nLinkHeaderLen ],
  136. nTemp );
  137. }
  138. pSH->m_nPendingSize += nLen;
  139. }
  140. }
  141. else //这次还是没有收完包头, 继续Pending
  142. {
  143. //LOG4C((LOG_NOTICE, "这次还是没有收完包头, 继续Pending"));
  144. memcpy( &pSH->m_PendingBuffer[ pSH->m_nPendingSize ], pData, nLen );
  145. pSH->m_nPendingSize += nLen;
  146. nProcessedLen = nLen;
  147. }
  148. }
  149. else //Header部分已经在阻塞的缓冲区中
  150. {
  151. nProcessedLen = pHeader->nLen - pSH->m_nPendingSize;
  152. if ( nProcessedLen <= nLen ) //如果需要处理的长度小于现有包的长度
  153. {
  154. memcpy( &pSH->m_PendingBuffer[ pSH->m_nPendingSize ], pData, nProcessedLen );
  155. pSH->m_nPendingSize = 0;
  156. }
  157. else //否则要继续阻塞
  158. {
  159. memcpy( &pSH->m_PendingBuffer[ pSH->m_nPendingSize ], pData, nLen );
  160. pSH->m_nPendingSize += nLen;
  161. }
  162. }
  163. }
  164. else //第一次接包
  165. {
  166. //LOG4C((LOG_NOTICE, "第一次接包"));
  167. pHeader = (ProtocolHeader *)&( (unsigned char *)pData )[nBuffIndex];
  168. if( nLen - nBuffIndex < sizeof(ProtocolHeader) ) // 没有收够包头,先记录当前收到的Buffer
  169. {
  170. //如果第一次接包就没有收够包头,认为是非法包,扔掉,就是说已处理的长度nProcessedLen = 0
  171. pSH->m_nPendingSize = nLen - nBuffIndex;
  172. memcpy(pSH->m_PendingBuffer, pHeader, pSH->m_nPendingSize);
  173. //LOG4C((LOG_NOTICE, "第一次接包就没有收够包头,认为是非法包,扔掉"));
  174. }
  175. else
  176. {
  177. nProcessedLen = pHeader->nLen;
  178. if( (int)pHeader->nLen > nLen - nBuffIndex )
  179. {
  180. memcpy(pSH->m_PendingBuffer, pHeader, nLen - nBuffIndex);
  181. //如果第一次接包,pHeader->nLen大于当前包的总长,认为是非法包,扔掉
  182. if( nBuffIndex == 0 )
  183. {
  184. //组包错误,则扔掉当前包
  185. //LOG4C((LOG_NOTICE, "第一次接包,服务器pHeader->nLen大于当前包的总长,认为是非法包,扔掉\r\n"));
  186. }
  187. pSH->m_nPendingSize = nLen - nBuffIndex;
  188. nProcessedLen = nLen - nBuffIndex;
  189. }
  190. else
  191. {
  192. //LOG4C((LOG_NOTICE, "正常包"));
  193. pSH->m_nPendingSize = 0;
  194. }
  195. }
  196. }
  197. if ( nProcessedLen == 0 )
  198. {
  199. // 没有收够包头,认为是非法包,扔掉
  200. //LOG4C((LOG_NOTICE, "没有收够包头,认为是非法包,扔掉"));
  201. break;
  202. }
  203. if ( pSH->m_nPendingSize == 0 )
  204. {
  205. if ( pHeader->nLen > SOCKET_BUFFSIZE )
  206. {
  207. // 包长度超过限制
  208. //LOG4C((LOG_NOTICE, "pHeader->nLen超过限制"));
  209. }
  210. if(-1 == OnCmdProcess( pSocketHandle, pHeader ))
  211. {
  212. //MessageBox( NULL, "Error OnCmdProcess", NULL, MB_OK );
  213. //LOG4C((LOG_NOTICE, "Error OnCmdProcess"));
  214. break;
  215. }
  216. }
  217. nBuffIndex += nProcessedLen;
  218. }
  219. LeaveCriticalSection( &(pSH->m_hClient2SrvSection) );
  220. }