注意点:头信息有些参数可能无用,但为了保险起见先添加所有头信息,然后用wireshark查看 “jmter调试运行结果” 和 “手动操作的请求结果” 作对比,直到完全一样或相近为止。
1.打开wireshark设置过滤规则,操作发送http请求。请求响应结果见下图
1 POST / HTTP/1.1 2 Connection: keep-alive 3 businesstype: attachsign 4 totallength: 1 5 plainbase64: false 6 digestalg: sha256 7 certinfo: cnNh 8 certmode: certid 9 errorlog: false 10 version: 1.0 11 Accept-Encoding: gzip,deflate 12 messagetype: http 13 messagebodytype: first 14 Content-Type: application/x-www-form-urlencoded 15 Content-Length: 1 16 Host: 168.1.1.7:8000 17 User-Agent: Apache-HttpClient/4.5.3 (Java/1.8.0_131) 18 19 dHTTP/1.1 200 OK 20 server_version: 2.0.308.5 21 version: 1.0 22 Content-Type: text/plain;charset=utf-8 23 Content-Length: 892 24 Connection: keep-alive 25 businesstype: attachsign 26 datalength: 892 27 errorcode: 0 28 29 0..x. *.H.. 30 ......i0..e...1.0 31 . `.H.e......0.. *.H.. 32 .......d...W0..S0..........Y... 33 %~.0 34 . *.H.. 35 .....0,1.0 ..U....CN1.0 36 ..U. 37 ..JIT1.0 38 ..U....DemoCA0.. 39 150616094656Z. 40 200616094656Z0.1.0 ..U....CN1.0 41 ..U. 42 ..JIT1.0...U....rsa_10240..0 43 . *.H.. 44 .........0...........;I..h...M..r.............. ..$3.`kY......r...S..I..3.Ar.......7..1.......r.2.AS..^=....q..zQ..:*.... 45 .z.3}....gZ/..I..7..1m......|0z0...U.#..0.....Ct....I@:%.s.y.}..0+..U...$0"0 ......http://127.0.0.1/crl16.crl0...U........0...U......q.....>.kl.!..h\'....0 46 . *.H.. 47 ..........H...:..{.*d@......l_.aI._...pR.O...\'.......=.i.\'g.e.<._.. 48 s.r..U...K1bzak.8.f......q../.G.9.k.<N.o..}..(,....5.i../.<.....P...N1..0.....080,1.0 ..U....CN1.0 49 ..U. 50 ..JIT1.0 51 ..U....DemoCA..Y... 52 %~.0 53 . `.H.e......0 54 . *.H.. 55 ........ 56 ......J......9......M.T.N...3..zlo.Gnv@v......vh.3xK>...." 1.9Y.@.!.T*{.....A.!._..89.z[0.`....+..2...Mr.*.T.....J.v.XQ...p#.IL
2.Jmeter添加必要的控制器、元件见图,然后添加头文件到http信息头
3.将请求内容直接添加到bodydata里
4.执行脚本查看是否有响应,响应成功,查看服务器业务也做成功了。