SAMD21 / W5100 / Ethernet - Case 2.9 : Pass - 17 ms @ 2020-06-03T11:21:39.708Z
Case Description
Send unsolicited pong with payload. Send ping with payload. Verify pong for ping is received.
Case Expectation
Nothing in reply to own Pong, but Pong with payload echo'ed in reply to Ping. Clean close with normal code.
Case Outcome
Actual events match at least one expected.
Expected:
{'OK': [('pong', u'ping payload')]}
Observed:
[('pong', u'ping payload')]
Case Closing Behavior
Connection was properly closed (OK)
GET /runCase?case=25&agent=SAMD21%20/%20W5100%20/%20Ethernet HTTP/1.1 Host: 192.168.46.31:9001 Upgrade: websocket Connection: Upgrade Sec-WebSocket-Key: YdFeKLeMCkXuObAMo4cDOw== Sec-WebSocket-Version: 13
HTTP/1.1 101 Switching Protocols Server: AutobahnTestSuite/0.8.0-0.10.9 X-Powered-By: AutobahnPython/0.10.9 Upgrade: WebSocket Connection: Upgrade Sec-WebSocket-Accept: ce0FMAJTGrGjBfbo6tfV9Ty4/0I=
Key | Value | Description |
isServer | True | True, iff I (the fuzzer) am a server, and the peer is a client. |
closedByMe | True | True, iff I have initiated closing handshake (that is, did send close first). |
failedByMe | False | True, iff I have failed the WS connection (i.e. due to protocol error). Failing can be either by initiating closing handshake or brutal drop TCP. |
droppedByMe | True | True, iff I dropped the TCP connection. |
wasClean | True | True, iff full WebSocket closing handshake was performed (close frame sent and received) _and_ the server dropped the TCP (which is its responsibility). |
wasNotCleanReason | None | When wasClean == False, the reason what happened. |
wasServerConnectionDropTimeout | False | When we are a client, and we expected the server to drop the TCP, but that didn't happen in time, this gets True. |
wasOpenHandshakeTimeout | False | When performing the opening handshake, but the peer did not finish in time, this gets True. |
wasCloseHandshakeTimeout | False | When we initiated a closing handshake, but the peer did not respond in time, this gets True. |
localCloseCode | 1000 | The close code I sent in close frame (if any). |
localCloseReason | None | The close reason I sent in close frame (if any). |
remoteCloseCode | 1000 | The close code the peer sent me in close frame (if any). |
remoteCloseReason | None | The close reason the peer sent me in close frame (if any). |
Chop Size | Count | Octets |
1 | 4 | 4 |
2 | 6 | 12 |
4 | 1 | 4 |
5 | 2 | 10 |
19 | 1 | 19 |
20 | 1 | 20 |
26 | 1 | 26 |
27 | 1 | 27 |
45 | 1 | 45 |
71 | 1 | 71 |
Total | 19 | 238 |
Chop Size | Count | Octets |
4 | 1 | 4 |
14 | 1 | 14 |
26 | 1 | 26 |
206 | 1 | 206 |
Total | 4 | 250 |
Opcode | Count |
8 | 1 |
10 | 1 |
Total | 2 |
Opcode | Count |
8 | 1 |
9 | 1 |
10 | 1 |
Total | 3 |
000 RX OCTETS: 474554202f72756e436173653f636173653d3235266167656e743d53414d4432312532302f25323057353130302532302f25
323045746865726e657420485454 ...
001 RX OCTETS: 486f73743a203139322e3136382e34362e33313a393030310d0a
002 RX OCTETS: 557067726164653a20776562736f636b65740d0a
003 RX OCTETS: 436f6e6e656374696f6e3a2055706772616465
004 RX OCTETS: 0d0a
005 RX OCTETS: 5365632d576562536f636b65742d4b65793a20596446654b4c654d436b58754f62414d6f3463444f773d3d0d0a
006 RX OCTETS: 5365632d576562536f636b65742d56657273696f6e3a2031330d0a
007 RX OCTETS: 0d0a
008 TX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a5365727665723a204175746f6261686e
5465737453756974652f302e382e ...
009 TX FRAME : OPCODE=10, FIN=True, RSV=0, PAYLOAD-LEN=24, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
unsolicited pong payload
010 TX OCTETS: 8a18756e736f6c69636974656420706f6e67207061796c6f6164
011 TX FRAME : OPCODE=9, FIN=True, RSV=0, PAYLOAD-LEN=12, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
ping payload
012 TX OCTETS: 890c70696e67207061796c6f6164
013 CLOSE CONNECTION AFTER 1.000000 sec
014 RX OCTETS: 8a8c
015 RX OCTETS: d6eb3dada6
016 RX OCTETS: 82
017 RX OCTETS: 53ca
018 RX OCTETS: f69b
019 RX OCTETS: 5cd4ba84
020 RX OCTETS: 5cc9
021 RX FRAME : OPCODE=10, FIN=True, RSV=0, PAYLOAD-LEN=12, MASKED=True, MASK=6436656233646164
ping payload
022 TX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
0x03e8
023 TX OCTETS: 880203e8
024 RX OCTETS: 88
025 RX OCTETS: 82
026 RX OCTETS: 4f3f50574c
027 RX OCTETS: d7
028 RX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASKED=True, MASK=3466336635303537
0x03e8
029 TCP DROPPED BY ME