SAMD21 / W5100 / Ethernet - Case 5.19 : Pass - 1020 ms @ 2020-06-03T11:21:44.574Z
Case Description
A fragmented text message is sent in multiple frames. After
sending the first 2 frames of the text message, a Ping is sent. Then we wait 1s,
then we send 2 more text fragments, another Ping and then the final text fragment.
Everything is legal.
Case Expectation
The peer immediately answers the first Ping before
it has received the last text message fragment. The peer pong's back the Ping's
payload exactly, and echo's the payload of the fragmented message back to us.
Case Outcome
Actual events match at least one expected.
Expected:
{'OK': [('pong', u'pongme 1!'), ('pong', u'pongme 2!'), ('message', u'fragment1fragment2fragment3fragment4fragment5', False)]}
Observed:
[('pong', u'pongme 1!'), ('pong', u'pongme 2!'), ('message', u'fragment1fragment2fragment3fragment4fragment5', False)]
Case Closing Behavior
Connection was properly closed (OK)
GET /runCase?case=63&agent=SAMD21%20/%20W5100%20/%20Ethernet HTTP/1.1 Host: 192.168.46.31:9001 Upgrade: websocket Connection: Upgrade Sec-WebSocket-Key: NzpwiYZaK8/fdwzH2I1MlQ== Sec-WebSocket-Version: 13
HTTP/1.1 101 Switching Protocols Server: AutobahnTestSuite/0.8.0-0.10.9 X-Powered-By: AutobahnPython/0.10.9 Upgrade: WebSocket Connection: Upgrade Sec-WebSocket-Accept: +rEfm7UTCo2hCJ8gWijkDNN454c=
Key | Value | Description |
isServer | True | True, iff I (the fuzzer) am a server, and the peer is a client. |
closedByMe | True | True, iff I have initiated closing handshake (that is, did send close first). |
failedByMe | False | True, iff I have failed the WS connection (i.e. due to protocol error). Failing can be either by initiating closing handshake or brutal drop TCP. |
droppedByMe | True | True, iff I dropped the TCP connection. |
wasClean | True | True, iff full WebSocket closing handshake was performed (close frame sent and received) _and_ the server dropped the TCP (which is its responsibility). |
wasNotCleanReason | None | When wasClean == False, the reason what happened. |
wasServerConnectionDropTimeout | False | When we are a client, and we expected the server to drop the TCP, but that didn't happen in time, this gets True. |
wasOpenHandshakeTimeout | False | When performing the opening handshake, but the peer did not finish in time, this gets True. |
wasCloseHandshakeTimeout | False | When we initiated a closing handshake, but the peer did not respond in time, this gets True. |
localCloseCode | 1000 | The close code I sent in close frame (if any). |
localCloseReason | None | The close reason I sent in close frame (if any). |
remoteCloseCode | 1000 | The close code the peer sent me in close frame (if any). |
remoteCloseReason | None | The close reason the peer sent me in close frame (if any). |
Chop Size | Count | Octets |
1 | 13 | 13 |
2 | 6 | 12 |
3 | 1 | 3 |
4 | 6 | 24 |
5 | 1 | 5 |
6 | 2 | 12 |
7 | 1 | 7 |
13 | 1 | 13 |
29 | 1 | 29 |
45 | 1 | 45 |
138 | 1 | 138 |
Total | 34 | 301 |
Chop Size | Count | Octets |
4 | 1 | 4 |
11 | 7 | 77 |
206 | 1 | 206 |
Total | 9 | 287 |
Opcode | Count |
1 | 1 |
8 | 1 |
10 | 2 |
Total | 4 |
Opcode | Count |
0 | 4 |
1 | 1 |
8 | 1 |
9 | 2 |
Total | 8 |
000 RX OCTETS: 474554202f72756e436173653f636173653d3633266167656e743d53414d4432312532302f25323057353130302532302f25
323045746865726e657420485454 ...
001 RX OCTETS: 5365632d576562536f636b65742d4b65793a204e7a707769595a614b382f6664777a483249314d6c513d3d0d0a
002 RX OCTETS: 5365632d576562536f636b65742d56657273696f6e3a2031330d0a0d0a
003 TX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a5365727665723a204175746f6261686e
5465737453756974652f302e382e ...
004 TX FRAME : OPCODE=1, FIN=False, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
fragment1
005 TX OCTETS: 0109667261676d656e7431
006 TX FRAME : OPCODE=0, FIN=False, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
fragment2
007 TX OCTETS: 0009667261676d656e7432
008 TX FRAME : OPCODE=9, FIN=True, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
pongme 1!
009 TX OCTETS: 8909706f6e676d65203121
010 DELAY 1.000000 sec for TAG None
011 RX OCTETS: 8a89
012 RX OCTETS: 033cc7a67353a9
013 RX OCTETS: c16e59e79722
014 RX FRAME : OPCODE=10, FIN=True, RSV=0, PAYLOAD-LEN=9, MASKED=True, MASK=3033336363376136
pongme 1!
015 DELAY TIMEOUT on TAG None
016 TX FRAME : OPCODE=0, FIN=False, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
fragment3
017 TX OCTETS: 0009667261676d656e7433
018 TX FRAME : OPCODE=0, FIN=False, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
fragment4
019 TX OCTETS: 0009667261676d656e7434
020 TX FRAME : OPCODE=9, FIN=True, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
pongme 2!
021 TX OCTETS: 8909706f6e676d65203221
022 TX FRAME : OPCODE=0, FIN=True, RSV=0, PAYLOAD-LEN=9, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
fragment5
023 TX OCTETS: 8009667261676d656e7435
024 CLOSE CONNECTION AFTER 1.000000 sec
025 RX OCTETS: 8a89
026 RX OCTETS: d5eb0e9a
027 RX OCTETS: a584
028 RX OCTETS: 60fdb88e2e
029 RX OCTETS: a8
030 RX OCTETS: f4
031 RX FRAME : OPCODE=10, FIN=True, RSV=0, PAYLOAD-LEN=9, MASKED=True, MASK=6435656230653961
pongme 2!
032 RX OCTETS: 81ad
033 RX OCTETS: 1809f3d1
034 RX OCTETS: 7e7b92b6
035 RX OCTETS: 75
036 RX OCTETS: 6c
037 RX OCTETS: 9d
038 RX OCTETS: a5296f81b07f
039 RX OCTETS: 6496bf6c
040 RX OCTETS: 3b
041 RX OCTETS: 95
042 RX OCTETS: a3796e9eb4767dc0b76a6894bc
043 RX OCTETS: 7d
044 RX OCTETS: 6787e5
045 RX OCTETS: 7e
046 RX OCTETS: 7b92
047 RX OCTETS: b6756c9d
048 RX OCTETS: a5
049 RX OCTETS: 2d
050 RX FRAME : OPCODE=1, FIN=True, RSV=0, PAYLOAD-LEN=45, MASKED=True, MASK=3138303966336431
fragment1fragment2fragment3fragment4fragment5
051 TX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASK=None, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
0x03e8
052 TX OCTETS: 880203e8
053 RX OCTETS: 88
054 RX OCTETS: 82
055 RX OCTETS: 70aad01f
056 RX OCTETS: 7342
057 RX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASKED=True, MASK=3730616164303166
0x03e8
058 TCP DROPPED BY ME