Autobahn WebSocket Testsuite Report
Autobahn WebSocket

SAMD21 / W5100 / Ethernet - Case 7.9.4 : Pass - 5 ms @ 2020-06-03T17:02:59.578Z

Case Description

Send close with invalid close code 1005

Case Expectation

Clean close with protocol error code or drop TCP

Case Outcome

Actual events match at least one expected.

Expected:
{'OK': []}

Observed:
[]

Case Closing Behavior

Connection was properly closed (OK)



Opening Handshake

GET / HTTP/1.1
User-Agent: AutobahnTestSuite/0.8.0-0.10.9
Host: 192.168.46.183:9001
Upgrade: WebSocket
Connection: Upgrade
Pragma: no-cache
Cache-Control: no-cache
Sec-WebSocket-Key: dE3bo1INDGYS8S3xkPdCVg==
Sec-WebSocket-Version: 13
HTTP/1.1 101 Switching Protocols
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Accept: hkQ5GI9F0pxyD4Kx2rV2z8pvEeU=


Closing Behavior

KeyValueDescription
isServerFalseTrue, iff I (the fuzzer) am a server, and the peer is a client.
closedByMeTrueTrue, iff I have initiated closing handshake (that is, did send close first).
failedByMeFalseTrue, iff I have failed the WS connection (i.e. due to protocol error). Failing can be either by initiating closing handshake or brutal drop TCP.
droppedByMeFalseTrue, iff I dropped the TCP connection.
wasCleanTrueTrue, iff full WebSocket closing handshake was performed (close frame sent and received) _and_ the server dropped the TCP (which is its responsibility).
wasNotCleanReasonNoneWhen wasClean == False, the reason what happened.
wasServerConnectionDropTimeoutFalseWhen we are a client, and we expected the server to drop the TCP, but that didn't happen in time, this gets True.
wasOpenHandshakeTimeoutFalseWhen performing the opening handshake, but the peer did not finish in time, this gets True.
wasCloseHandshakeTimeoutFalseWhen we initiated a closing handshake, but the peer did not respond in time, this gets True.
localCloseCode1005The close code I sent in close frame (if any).
localCloseReasonNoneThe close reason I sent in close frame (if any).
remoteCloseCode1002The close code the peer sent me in close frame (if any).
remoteCloseReasonNoneThe close reason the peer sent me in close frame (if any).


Wire Statistics

Octets Received by Chop Size

Chop SizeCountOctets
236
414
18118
21121
32132
52152
Total8133

Octets Transmitted by Chop Size

Chop SizeCountOctets
818
2451245
Total2253

Frames Received by Opcode

OpcodeCount
81
Total1

Frames Transmitted by Opcode

OpcodeCount
81
Total1


Wire Log

000 TX OCTETS: 474554202f20485454502f312e310d0a557365722d4167656e743a204175746f6261686e5465737453756974652f302e382e
               302d302e31302e390d0a486f7374 ...
001 RX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c73
002 RX OCTETS: 0d0a
003 RX OCTETS: 557067726164653a20776562736f636b6574
004 RX OCTETS: 0d0a
005 RX OCTETS: 436f6e6e656374696f6e3a20557067726164650d0a
006 RX OCTETS: 5365632d576562536f636b65742d4163636570743a20686b5135474939463070787944344b78327256327a3870764565553d
               0d0a
007 RX OCTETS: 0d0a
008 TX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASK=81b5ba87, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
               0x03ed
009 TX OCTETS: 888281b5ba878258
010 FAIL CONNECTION AFTER 1.000000 sec
011 RX OCTETS: 880203ea
012 RX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASKED=False, MASK=None
               0x03ea
013 TCP DROPPED BY PEER