在PHP中发出gzip deflate请求后,我收到了偏移块中的缩减字符串,如下所示
示例缩短为显示格式:
00001B4E
¾”kŒj…Øæ’ìÑ«F1ìÊ`+ƒQì¹UÜjùJƒZ\µy¡ÓUžGr‡J&=KLËÙÍ~=ÍkR
0000102F
ñÞœÞôΑüo[¾”+’Ñ8#à»0±R-4VÕ’n›êˆÍ.MCŽ…ÏÖr¿3M—èßñ°r¡\+
00000000
我无法夸大那个大概是因为分块格式。用Hex编辑器手动删除偏移并读取gzip存档后,我可以确认数据没有损坏。我想知道是否有一种正确的方法可以将这个分块的gzip泄密响应解析成一个可读的字符串?
我或许能够将这些偏移分开并将数据连接在一起以调用gzinflate,但似乎必须有一种更简单的方法。
答案 0 :(得分:10)
缩小分块响应的正确方法大致如下:
initialise string to hold result
for each chunk {
check that the stated chunk length equals the string length of the chunk
append the chunk data to the result variable
}
这是一个方便的PHP函数( FIXED ):
function unchunk_string ($str) {
// A string to hold the result
$result = '';
// Split input by CRLF
$parts = explode("\r\n", $str);
// These vars track the current chunk
$chunkLen = 0;
$thisChunk = '';
// Loop the data
while (($part = array_shift($parts)) !== NULL) {
if ($chunkLen) {
// Add the data to the string
// Don't forget, the data might contain a literal CRLF
$thisChunk .= $part."\r\n";
if (strlen($thisChunk) == $chunkLen) {
// Chunk is complete
$result .= $thisChunk;
$chunkLen = 0;
$thisChunk = '';
} else if (strlen($thisChunk) == $chunkLen + 2) {
// Chunk is complete, remove trailing CRLF
$result .= substr($thisChunk, 0, -2);
$chunkLen = 0;
$thisChunk = '';
} else if (strlen($thisChunk) > $chunkLen) {
// Data is malformed
return FALSE;
}
} else {
// If we are not in a chunk, get length of the new one
if ($part === '') continue;
if (!$chunkLen = hexdec($part)) break;
}
}
// Return the decoded data of FALSE if it is incomplete
return ($chunkLen) ? FALSE : $result;
}
答案 1 :(得分:0)
要解码字符串使用gzinflate,Zend_Http_Client lib将有助于执行此类常见任务,无需使用,如果您需要自己执行此操作,请参阅Zend_Http_Response code