Pass (2011-09-22T21:49:10Z - 1002 ms)
Description
Send invalid UTF-8 text message in one frame, but 3 chops. First chop is valid, then wait, then send 2nd chop with payload octet making the sequence invalid, then wait, then send test rest of payload in last chop.
MESSAGE:
Îºá½¹ÏƒÎ¼Îµí €edited
cebae1bdb9cf83cebcceb5eda080656469746564
Expectation
The first chop is accepted, we expect to timeout on the first wait. The 2nd chop should be rejected immediately (fail fast on UTF-8) upon receiving the offending octet. If we timeout, we expect the connection is failed at least then, since the payload is not valid UTF-8.
Actual events match at least one expected.
Expected = {'NON-STRICT': [('timeout', 'A'), ('timeout', 'B')], 'OK': [('timeout', 'A')]}
Actual = [('timeout', 'A'), ('timeout', 'B')]
OK: Connection was properly closed
Chop Size | Count | Octets |
129 | 1 | 129 |
Total | 1 | 129 |
Chop Size | Count | Octets |
1 | 1 | 1 |
6 | 1 | 6 |
12 | 1 | 12 |
195 | 1 | 195 |
Total | 4 | 214 |
Opcode | Count |
Total | 0 |
Opcode | Count |
Total | 0 |
Key | Value |
isServer | 0 |
closedByMe | 0 |
failedByMe | 0 |
droppedByMe | 0 |
wasClean | 0 |
localCloseCode | None |
remoteCloseCode | None |
remoteCloseReason | None |
000 TX OCTETS: 474554202f20485454502f312e310d0a557365722d4167656e743a204175746f6261686e576562536f636b65747354657374
53756974652f302e342e320d0a486f73743a206c6f63616c686f73740d0a557067726164653a20776562736f636b65740d0a
436f6e6e656374696f6e3a20557067726164650d0a5365632d576562536f636b65742d4b65793a2057354a2f456832624f75
4c61786951755047735535773d3d0d0a5365632d576562536f636b65742d56657273696f6e3a2031330d0a0d0a
001 RX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a557067726164653a20776562736f636b
65740d0a436f6e6e656374696f6e3a20557067726164650d0a5365632d576562536f636b65742d4163636570743a20314a4a
526c2b574a396a70357647455a3657392b394e2b635452553d0d0a0d0a
002 TX OCTETS: 0194abf9b73a
003 TX OCTETS: 65435687123634f4173702d7
004 DELAY 1.000000 sec
005 TX OCTETS: 0b
006 DELAY 1.000000 sec
007 TCP CLOSED BY PEER