青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

<2013年10月>
293012345
6789101112
13141516171819
20212223242526
272829303112
3456789

統計

  • 隨筆 - 21
  • 文章 - 0
  • 評論 - 2
  • 引用 - 0

常用鏈接

留言簿

隨筆分類

隨筆檔案

搜索

  •  

最新評論

閱讀排行榜

評論排行榜

飛鴿協議以及其使用的UDP數據包格式和文件傳輸邏輯

Original ipmsg protocol specification is written in Japanese.

This document was translated by Mr.Kanazawa.

This document is not verified yet.

 

----------------------------------------------------------------------

        IP Messenger communication protocol (Draft-9)    1996/02/21

                                                Modified 2003/01/14

 

                                                       H.Shirouzu

                                               shirouzu@h.email.ne.jp

----------------------------------------------------------------------

 

About IP Messenger

         This is a Send/Receive message service using the TCP/UDP Port.

 

Characteristics

         IP Messenger can be installed in any OS if TCP/IP is used on your machine.

         Dynamic member recognition can be done within your network or specified network.

         You can exchange messages between all IPMsg members.

 

Function description

         Use TCP/UDP port(default:2425). See the following descriptions

         (Message Send/Receive: UDP, File Send/Receive: TCP)

 

  1. Command

 

     1) Command functions (Low 8 bits from command number 32 bits)

 

         IPMSG_NOOPERATION   No Operation

         IPMSG_BR_ENTRY           Entry to service (Start-up with a Broadcast command)

         IPMSG_BR_EXIT                Exit from service (End with a Broadcast command)

         IPMSG_ANSENTRY           Notify a new entry

         IPMSG_BR_ABSENCE      Change absence mode

 

         IPMSG_BR_ISGETLIST     Search valid sending host members

         IPMSG_OKGETLIST           Host list sending notice

         IPMSG_GETLIST                Host list sending request

         IPMSG_ANSLIST                Host list sending

 

         IPMSG_SENDMSG            Message transmission

         IPMSG_RECVMSG            Message receiving check

 

         IPMSG_READMSG            Message open notice

         IPMSG_DELMSG               Message discarded notice

         IPMSG_ANSREADMSG    Message open confirmation notice(added from version-8)

 

         IPMSG_GETFILEDATA      File Transfer request by TCP

         IPMSG_RELEASEFILES      Discard attachment file

         IPMSG_GETDIRFILES       Attachment hierarchical file request

 

         IPMSG_GETINFO               Get IPMSG version info.

         IPMSG_SENDINFO            Send IPMSG version info.

 

         IPMSG_GETABSENCEINFO       Get absence sentence

         IPMSG_SENDABSENCEINFO    Send absence sentence

 

         IPMSG_GETPUBKEY                  RSA Public Key Acquisition

         IPMSG_ANSPUBKEY                  RSA Public Key Response

 

     2) Option flag (High 24 bits from command number 32 bits)

 

         IPMSG_ABSENCEOPT      Absence mode(Member recognition command)

         IPMSG_SERVEROPT                   Server(Reserved)

         IPMSG_DIALUPOPT                   Send individual member recognition command

 

         IPMSG_SENDCHECKOPT Transmission check

         IPMSG_SECRETOPT                   Sealed message

         IPMSG_READCHECKOPT Sealed message check(added from ver8)

         IPMSG_PASSWORDOPT   Lock

         IPMSG_BROADCASTOPT          Broadcast message

         IPMSG_MULTICASTOPT  Multi-cast(Multiple casts selection)

         IPMSG_NEWMUTIOPT    New version multi-cast(reserved)

         IPMSG_AUTORETOPT      Automatic response(Ping-pong protection)

         IPMSG_NOLOGOPT          No log files

         IPMSG_NOADDLISTOPT  Notice to the members outside of BR_ENTRY

 

         IPMSG_FILEATTACHOPT File attachment

         IPMSG_ENCRYPTOPT      Code

 

         IPMSG_NOPOPUPOPT     (No longer valid)

         IPMSG_RETRYOPT            Re-send flag(Use when acquiring HOSTLIST)

 

     3) Extended code flag (hex format combination)

 

         IPMSG_RSA_512

         IPMSG_RSA_1024

         IPMSG_RSA_2048

         IPMSG_RC2_40

         IPMSG_RC2_128

         IPMSG_RC2_256

         IPMSG_BLOWFISH_128

         IPMSG_BLOWFISH_256

         IPMSG_SIGN_MD5

 

     4) Extended files for attachment (fileattr low 8 bits)

 

         IPMSG_FILE_REGULAR

         IPMSG_FILE_DIR

         IPMSG_FILE_RETPARENT

         IPMSG_FILE_SYMLINK

         IPMSG_FILE_CDEV

         IPMSG_FILE_BDEV

         IPMSG_FILE_FIFO

         IPMSG_FILE_RESFORK

 

     5) Attachment file extended attribute(fileattr high 24 bits)

 

         IPMSG_FILE_RONLYOPT

         IPMSG_FILE_HIDDENOPT

         IPMSG_FILE_EXHIDDENOPT

         IPMSG_FILE_ARCHIVEOPT

         IPMSG_FILE_SYSTEMOPT

 

     6) Extended file attribute for attachment file

 

         IPMSG_FILE_UID

         IPMSG_FILE_USERNAME

         IPMSG_FILE_GID

         IPMSG_FILE_GROUPNAME

         IPMSG_FILE_PERM

         IPMSG_FILE_MAJORNO

         IPMSG_FILE_MINORNO

         IPMSG_FILE_CTIME

         IPMSG_FILE_MTIME

         IPMSG_FILE_ATIME

         IPMSG_FILE_CREATETIME

 

         IPMSG_FILE_CREATOR

         IPMSG_FILE_FILETYPE

         IPMSG_FILE_FINDERINFO

 

         IPMSG_FILE_ACL

         IPMSG_FILE_ALIASFNAME

         IPMSG_FILE_UNICODEFNAME

 

 

  2.Command format(Use all character strings)

 

     1) Command(Format version-1)

 

         Ver(1) : PacketNo : SenderName : SenderHost : CommandNo : AdditionalSection

 

     2) An example for Message Send/Receive by using the current command format

 

         "1:100:shirouzu:jupiter:32:Hello"

 

 

  3.Command process overview

 

     1) Member recognition

 

         An IPMSG_BR_ENTRY command notifies a new entry to the current

         members at start-up.

 

         All members add the new member to their list after getting a notification message.

         An IPMSG_ANSENTRY command sends a message back to the new member.

 

         The new member gets the current member data by a

         IPMSG_ANSENTRY command. All members can communicate as long as an

         IP packet exists.

 

         An IPMSG_BR_ABSENCE command broadcasts absence mode cancel or

         nickname change to all members. However, an IPMSG_ANSENTRY command

         does not send a message back, which is different from an IPMSG_BR_ENTRY

         command.

 

         IPMSG_BR_ENTRY, IPMSG_ANSENTRY, and IPMSG_BR_ABSENCE commands

         use an IPMSG_ABSENCEOPT flag for absence mode. Input a nickname to

         additional command.

         Add an IPMSG_DIALUPOPT flag for dial-up users who can't be reached by

         a broadcast command.  A member recognition command needs to be

         sent individually to the members with this optional flag.

 

         (Extended group)IPMSG_BR_ENTRY and IPMSG_BR_ABSENCE commands

         sends a group name by adding the new group name after the current

         command format character strings (Input '\0' between the current

         command and extended name).

 

     2) Send/Receive Message

         Send Message uses an IPMSG_SENDMSG command that can input a message

         in the extended area.

         Receive Message sends back an IPMSG_RECVMSG command only

         if an IPMSG_SENDCHECKOPT flag is ON. Input the original packet number

         to the extended area.

 

         Broadcast Message Send uses an IPMSG_BOADCASTOPT command

         and an IPMSG_SENDMSG flag should be ON.

         Auto-Send packet(absence notice) needs to be added to IPMSG_AUTORETOPT

         for ping-pong protection. If either one or another packet is ON, then

         confirmation/auto-send packet is not sent back.

 

         Send Message Sealing needs to be an IPMSG_SECRETOPT packet ON.

         In this case, Receive Message sends an IPMSG_READMSG command.

         Input the original packet number to the extended area.

 

         (Additional IPMSG_NOADDLISTOPT)

         When receiving an IPMSG_SENDMSG packet from a host that is

         not on your Send/Receive list, IPMsg will either confirm a host by

         sending an IPMSG_BR_ENTRY command or add a host name to

         the Send/Receive list.

         However, single-shot Message Send/Receive action needs to be avoided.

         Add an IPMSG_NOADDLISTOPT flag to an IPMSG_SENDMSG command.

 

         (Additional IPMSG_READCHECKOPT from version-8)

         When an IPMSG_READMSG command contains an IPMSG_READCHECKOPT flag,

         IPMsg process is the same as IPMSG_SENDMSG with an

         IPMSG_SENDCHECKOPT flag.

         However, Send Message uses an IPMSG_ANSREADMSG command, 

         not IPMSG_RECVMSG.

 

     3) Message Send/Receive encrypted extension (Added in the version-9)

 

         Use the combination of Public-key(RSA) and common key(RC2/Blowfish).

         (Encrypted extension area is used in hex format.)

 

         (Public key acquisition)Send an IPMSG_GETPUBKEY command to Receive

         Message. Receive Message gets an IPMSG_ANSPUBKEY that

         means receiving RSA public key from Send Message.

 

         IPMSG_GETPUBKEY/IPMSG_ANSPUBKEY both require the value which is

         encryption capability (Exp. IPMSG_RSA_1024) flag uses "OR" at first

         part of extension 

 

         In addition, In IPMSG_ANSPUBKEY, public key written as EE-NNNNNN

         E=ExponentN=method)devide by ':'. and Input the Fdelimiter '-'

         between E and N.

 

         This sequence can be skipped after the 2nd Send/Receive process by

         memorizing public key and encrypted data.

        

         (Encrypted message)After a sender creates a common key that is

         supported both sender and receiver, a common key can encrypt a message.

         In addition, a receiver's public key encrypts the common key.

 

 

         (Encrypted message transmission) IPMSG_ENCRYPTOPT is used in

         IPMSG_SENDMSG. At the first part of extension, input the value which

         is 'or' resoult from Convination of public key and common key type .

         Then use common key which encrypt with public key devide by ':'.

         Then input message which is eccrypted by public key devide by ':'.

         If both supports IPMSG_SIGN_XXX, then add ':' and signeture.

 

         Also, In the method of encode padding, PKCS#1ECB key is used for RSA,

         PKCS#5 CBC common key is used for RC2/blowfish.

 

         Also, The Packet related to Entry manifestation the capability of

         ecryption support using  IPMSG_ENCRYPTOPT

 

     4) Extension with file attachment(Available from version-9)

 

         An IPMSG_SENDMSG command with an IPMSG_FILEATTACHOPT flag for

         File transfer (download permission)notification sends a message

         with attachment.

         Input '\0' after the message and attachment file data.

        

 

         fileID:filename:size:mtime:fileattr[:extend-attr=val1

         [,val2...][:extend-attr2=...]]:\a:fileID...

         (size, mtime, and fileattr describe hex format.

          If a filename contains ':', please replace with "::".)

 

         When Receive Message downloads an attachment file, an IPMSG_GETFILEDATA

         command requests a data transmission packet to the TCP port that is the same number 

         as the UDP sending port number. Input packetID:fileID:offset to the extended area.

         (Use all hex format.)

         File Transfer side receives the request. After recognizing that it's a correct request,

         then send the specified data (no format)

 

         When the data receiving side downloads a hierarchical attachment file,

         use an IPMSG_GETDIRFILES command and input a packetID:fileID

         to the extended area and send a data transmission request packet.

         (all hex format)

 

         Data sending side sends the following hierarchical data format.

         header-size:filename:file-size:fileattr[:extend-attr=val1

         [,val2...][:extend-attr2=...]]:contents-data

         Next headersize: Next filename...

         (All hex format except for filename and contetns-data)

 

         header-size is from the beginning of header-size to the delimiter ':'

         that is before contents-data. extend-attr can be omitted and used multiple

         extended attributes. Use '=' for data input.

 

         When fileattr is IPMSG_FILE_DIR, IPMsg recognizes that it is automatically

         in the directory, the next file data is after the directory.

 

         When fileattr is IPMSG_FILE_RETPARENT, IMPsg recognizes that it returns

         to the parent directory. In this case, File name is always "." and the attribute

         value is the current directory data.

 

         Sending process starts from the attachment directly and returns the

         IPMSG_FILE_RETPARENT command to the attachment directory.

 

         Add an IPMSG_FILEATTACHOPT flag for an Entry packet to support the

         attachment file.

 

     5) Other commands

 

         When acquiring different versions, send an IPMSG_GETINFO command.

         Receiving side sends the version information character string to

         extended area.

 

         Send an IPMSG_GETABSENCEINFO command for acquiring an absence message.

         Receiving side sends an IPMSG_SENDABSENCEINFO back if the status is absence mode.

         If the status is not absence mode, a character string "Not absence mode" will be sent back.

 

     6) Confirmation/Retry

 

         If a confirmation packet for IPMSG_SENDMSG or IPMSG_RECVMSG is not delivered

         within a specified time, then it will be sent again.

         A number of retry actions or interval period is depended on the current condition.

 

 

  4. Other

 

     1) Linefeed

 

         Linefeed characters in Send Message is standardized with UNIX type ('0x0a').

         Please change if needed.

 

     2) Delimiter ':'

 

         ':' is used as a delimiter. You can't use this delimiter for user name

         and host name.

         If the use/host names contain a ':', please replace with another sign,

         for an example ';'.

         Although using this delimiter isn't problem as yet, I may create an

         escape sequence.

        

 

     3) Kanji codes

 

         SJIS

 

 

  5. Contact e-mail address

 

         E-Mail shirouzu@h.email.ne.jp

 

 

Note

         See ipmsg.h for command codes.

         Please e-mail me your comments and suggestions.

 

 

 

Ipmsg里面UDP使用的數據包是下面msgMng的結構組成

msgMng數據包格式:

1 程序版本號

2數據包序列號

3用戶名

4主機名5

5命令

6消息內容

7 額外數據

 

15的內容是以“:”為分隔符,消息和額外數據以數據“0“分隔

 

 

 

發送文件的整個邏輯過程:

 

1發送端發送一個UDP數據包,通知接收端準備接收文件,通知在一個socket上監聽TCP連接事件

 

2 接收端回發一個UDP數據包,告訴發送端已準備好接收數據,并請求一個TCP的連接

 

3發送端接收連接的請求,并將文件映射到內存中,然后創建發送文件線程,開始進行數據的發送

 

4接收端創建接收的文件,然后創建接收數據的線程,開始收取數據.接受完以后,將數據寫入到創建好的文件中.

posted on 2010-01-11 15:23 ChinaPanda 閱讀(2098) 評論(0)  編輯 收藏 引用 所屬分類: network

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            久久夜色精品亚洲噜噜国产mv| 亚洲一区二区三区高清 | 91久久精品美女| 欧美顶级少妇做爰| 欧美高清在线一区二区| 亚洲免费观看高清完整版在线观看| 亚洲电影在线播放| 欧美v日韩v国产v| 亚洲日韩中文字幕在线播放| 91久久精品国产91久久| 欧美日韩国产综合久久| 亚洲综合第一| 久久riav二区三区| 亚洲精品乱码久久久久久| 91久久久国产精品| 国产精品久久久一区二区| 久久久夜夜夜| 欧美啪啪一区| 久久综合九色综合欧美就去吻| 欧美激情中文字幕乱码免费| 亚洲专区一区| 久久久国产精品一区二区中文| 亚洲免费高清| 久久国产免费| 亚洲欧美国产精品va在线观看| 久久精品免费看| 在线一区二区三区四区| 久久精品国产免费看久久精品| 日韩视频在线一区二区| 午夜免费在线观看精品视频| 亚洲乱码国产乱码精品精可以看 | 中文在线资源观看网站视频免费不卡| 国产一区视频网站| 亚洲精品综合精品自拍| 韩国视频理论视频久久| 日韩亚洲欧美一区二区三区| 国外成人网址| 亚洲免费一在线| 日韩午夜在线电影| 久久天天躁夜夜躁狠狠躁2022 | 一区二区三区高清不卡| 久久久综合网站| 久久黄色网页| 国产精品亚洲成人| 一本高清dvd不卡在线观看| 在线播放日韩欧美| 亚洲免费小视频| 亚洲一区二区综合| 欧美精品播放| 亚洲国产美女久久久久| 伊人久久婷婷| 久久精品成人一区二区三区蜜臀| 亚洲欧美日韩国产中文| 欧美日韩免费在线| 亚洲精品久久久久久久久久久| 在线观看精品| 久久精品夜色噜噜亚洲aⅴ| 欧美一区二区三区四区在线| 国产精品国产三级国产aⅴ入口| 亚洲国产一区二区三区高清 | 国产精品一二一区| 一区二区三区久久久| 日韩午夜精品视频| 欧美激情精品久久久六区热门 | 美女诱惑黄网站一区| 国产视频不卡| 欧美在线高清| 你懂的视频一区二区| 亚洲第一福利视频| 免费久久精品视频| 欧美激情一区二区久久久| 亚洲国产欧美精品| 欧美精品v日韩精品v韩国精品v| 亚洲大胆人体视频| 日韩亚洲一区在线播放| 欧美精品免费看| 一区二区三区视频观看| 欧美亚洲综合在线| 国产一区二区| 久久久欧美精品sm网站| 欧美韩日一区| 中文国产成人精品久久一| 欧美性开放视频| 性做久久久久久免费观看欧美| 久久在精品线影院精品国产| 在线国产亚洲欧美| 欧美激情一区二区三级高清视频 | 亚洲一区二区在线看| 久久精品一区二区三区不卡牛牛| 在线看欧美视频| 欧美精品日韩综合在线| 亚洲免费在线观看视频| 久久综合亚州| 亚洲视频专区在线| 国产亚洲成精品久久| 久久综合久久美利坚合众国| 日韩视频在线观看国产| 久久久福利视频| 亚洲精品视频一区| 国产精品亚洲一区二区三区在线| 久久精品一二三区| 亚洲天堂av在线免费观看| 麻豆免费精品视频| 亚洲综合三区| 亚洲国产中文字幕在线观看| 国产精品久久久久9999吃药| 久久免费的精品国产v∧| 亚洲日本一区二区三区| 久久精品夜夜夜夜久久| 99这里只有精品| 国产综合精品| 国产精品久久久久7777婷婷| 欧美v日韩v国产v| 欧美在线综合| 亚洲一区二区三区精品在线观看| 亚洲国产精品悠悠久久琪琪| 久久经典综合| 亚洲免费中文字幕| 日韩一级片网址| 影音欧美亚洲| 狠狠色狠狠色综合日日五 | 欧美一区视频| 亚洲一品av免费观看| 亚洲国产黄色片| 久久综合久久久久88| 午夜精品三级视频福利| 一区二区三区日韩在线观看| 亚洲日韩欧美视频| 在线观看av一区| 国产午夜精品美女视频明星a级 | 狠狠色2019综合网| 国产中文一区二区| 国产女主播一区二区三区| 欧美三区免费完整视频在线观看| 男男成人高潮片免费网站| 久久久999| 久久成人免费| 久久免费视频一区| 久久精品国产综合| 久久漫画官网| 奶水喷射视频一区| 欧美大尺度在线| 欧美成人精品激情在线观看| 免播放器亚洲一区| 欧美福利视频在线| 欧美日韩1区2区3区| 欧美日韩美女一区二区| 欧美午夜精品伦理| 国产精品一区二区在线观看不卡 | 欧美另类久久久品| 欧美日韩亚洲高清| 欧美性视频网站| 国产精品初高中精品久久| 国产精品视频免费观看www| 国产精品美女久久久久久2018| 国产精品中文字幕欧美| 国产欧美69| 曰本成人黄色| 日韩一区二区免费高清| 亚洲欧美精品| 久久综合亚州| 日韩午夜精品| 性欧美8khd高清极品| 久久综合五月天婷婷伊人| 欧美精品一区二区三区蜜桃| 国产精品xvideos88| 国产午夜精品一区二区三区视频| 国内视频一区| 亚洲日本一区二区三区| 亚洲女人小视频在线观看| 久久精品二区亚洲w码| 欧美国产视频在线| 一本久久综合| 久久精品国产综合精品| 欧美日韩高清在线播放| 国产亚洲精品高潮| 99爱精品视频| 久久久久国产精品www| 亚洲精品偷拍| 欧美有码视频| 欧美三日本三级少妇三2023 | 国内一区二区三区在线视频| 亚洲美女啪啪| 久久综合电影一区| 日韩视频中午一区| 另类av导航| 国产精一区二区三区| 亚洲精品一区二区三区av| 欧美一区二区视频97| 91久久精品一区二区三区| 欧美在线看片| 国产精品―色哟哟| 一区二区高清在线观看| 久久男人av资源网站| 亚洲图片欧美日产| 欧美激情性爽国产精品17p| 国产视频一区二区三区在线观看| 夜夜嗨av一区二区三区| 欧美成人三级在线| 欧美一二三区精品|