Pass (2011-09-22T18:47:12Z - 1001 ms)
Description
Send invalid UTF-8 text message in one frame, but 3 chops. First chop is valid, then wait, then send 2nd chop with payload octet making the sequence invalid, then wait, then send test rest of payload in last chop.
MESSAGE:
Îºá½¹ÏƒÎ¼Îµí €edited
cebae1bdb9cf83cebcceb5eda080656469746564
Expectation
The first chop is accepted, we expect to timeout on the first wait. The 2nd chop should be rejected immediately (fail fast on UTF-8) upon receiving the offending octet. If we timeout, we expect the connection is failed at least then, since the payload is not valid UTF-8.
Actual events match at least one expected.
Expected = {'NON-STRICT': [('timeout', 'A'), ('timeout', 'B')], 'OK': [('timeout', 'A')]}
Actual = [('timeout', 'A'), ('timeout', 'B')]
OK: Connection was properly closed
Chop Size | Count | Octets |
129 | 1 | 129 |
Total | 1 | 129 |
Chop Size | Count | Octets |
1 | 1 | 1 |
6 | 1 | 6 |
12 | 1 | 12 |
195 | 1 | 195 |
Total | 4 | 214 |
Opcode | Count |
Total | 0 |
Opcode | Count |
Total | 0 |
Key | Value |
isServer | 0 |
closedByMe | 0 |
failedByMe | 0 |
droppedByMe | 0 |
wasClean | 0 |
localCloseCode | None |
remoteCloseCode | None |
remoteCloseReason | None |
000 TX OCTETS: 474554202f20485454502f312e310d0a557365722d4167656e743a204175746f6261686e576562536f636b65747354657374
53756974652f302e342e320d0a486f73743a206c6f63616c686f73740d0a557067726164653a20776562736f636b65740d0a
436f6e6e656374696f6e3a20557067726164650d0a5365632d576562536f636b65742d4b65793a206b68344d33452b384a61
39627578766c3053307347673d3d0d0a5365632d576562536f636b65742d56657273696f6e3a2031330d0a0d0a
001 RX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a557067726164653a20776562736f636b
65740d0a436f6e6e656374696f6e3a20557067726164650d0a5365632d576562536f636b65742d4163636570743a207a3331
5047634848713735654d362b6c715a3942677278693236383d0d0a0d0a
002 TX OCTETS: 0194992e1e9c
003 TX OCTETS: 5794ff2120e19d5225e0ab71
004 DELAY 1.000000 sec
005 TX OCTETS: 39
006 DELAY 1.000000 sec
007 TCP CLOSED BY PEER