Pass (2011-09-22T21:49:11Z - 1001 ms)
Description
Send invalid UTF-8 text message in 2 fragments plus more. First is valid, then wait, then in 2nd frame, send the octet making the sequence invalid, then wait, then send test rest of 2nd frame. Then we send 64k frames forever.
MESSAGE:
Îºá½¹ÏƒÎ¼Îµí €edited
cebae1bdb9cf83cebcceb5eda080656469746564
Expectation
The first frame is accepted, we expect to timeout on the first wait. The 2nd frame should be rejected immediately (fail fast on UTF-8) upon receiving the offending octet. If we timeout, we expect the connection is failed at least then, since the payload is not valid UTF-8.
Actual events match at least one expected.
Expected = {'NON-STRICT': [('timeout', 'A'), ('timeout', 'B')], 'OK': [('timeout', 'A')]}
Actual = [('timeout', 'A'), ('timeout', 'B')]
OK: Connection was properly closed
Chop Size | Count | Octets |
129 | 1 | 129 |
Total | 1 | 129 |
Chop Size | Count | Octets |
1 | 1 | 1 |
6 | 1 | 6 |
12 | 1 | 12 |
195 | 1 | 195 |
Total | 4 | 214 |
Opcode | Count |
Total | 0 |
Opcode | Count |
Total | 0 |
Key | Value |
isServer | 0 |
closedByMe | 0 |
failedByMe | 0 |
droppedByMe | 0 |
wasClean | 0 |
localCloseCode | None |
remoteCloseCode | None |
remoteCloseReason | None |
000 TX OCTETS: 474554202f20485454502f312e310d0a557365722d4167656e743a204175746f6261686e576562536f636b65747354657374
53756974652f302e342e320d0a486f73743a206c6f63616c686f73740d0a557067726164653a20776562736f636b65740d0a
436f6e6e656374696f6e3a20557067726164650d0a5365632d576562536f636b65742d4b65793a202b675965462b306a6644
7555506f364b516c736462673d3d0d0a5365632d576562536f636b65742d56657273696f6e3a2031330d0a0d0a
001 RX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a557067726164653a20776562736f636b
65740d0a436f6e6e656374696f6e3a20557067726164650d0a5365632d576562536f636b65742d4163636570743a2044436e
6250566267555435506e56377033644532646334753933733d0d0a0d0a
002 TX OCTETS: 0194abe7ad53
003 TX OCTETS: 655d4cee12282e9d172918be
004 DELAY 1.000000 sec
005 TX OCTETS: 0b
006 DELAY 1.000000 sec
007 TCP CLOSED BY PEER