这不安全!但是显示了如何在初始HTTP标头之后的输入流中获取POST数据。
这也仅适用于以“ example = true&bad = false”等形式出现的POST数据。
private HashMap hashMap = new HashMap();private StringBuffer buff = new StringBuffer();private int c = 0;private String[] post; public PostInputStream(InputStream in) { try { //Initalizes avaliable buff if (in.available() != 0) { this.buff.appendCodePoint((this.c = in.read())); while (0 != in.available()) { //Console.output(buff.toString()); buff.appendCodePoint((this.c = in.read())); } this.post = buff.toString().split("&"); for (int i = 0; i < this.post.length; i++) { String[] n = this.post[i].split("="); if (n.length == 2) { hashMap.put(URLDeprer.depre(n[0], "UTF-8"), URLDeprer.depre(n[1], "UTF-8")); } else { Console.error("Malformed Post Request."); } } } else { Console.error("No POST Data"); } } catch (Exception e) { e.printStackTrace(); }}
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)