Autobahn WebSocket Testsuite Report
Autobahn WebSocket

tls - Case 13.4.4 : Pass - 2033 ms @ 2021-07-05T09:40:48.684Z

Case Description

Send 1000 compressed messages each of payload size 1024, auto-fragment to 0 octets. Use permessage-deflate client offers (requestNoContextTakeover, requestMaxWindowBits): [(False, 15)]

Case Expectation

Receive echo'ed messages (with payload as sent). Timeout case after 240 secs.

Case Outcome

Ok, received all echo'ed messages in time.

Expected:
{}

Observed:
[]

Case Closing Behavior

Connection was properly closed (OK)



Opening Handshake

GET /echo/message HTTP/1.1
User-Agent: AutobahnTestSuite/0.8.2-0.10.9
Host: localhost:9999
Upgrade: WebSocket
Connection: Upgrade
Pragma: no-cache
Cache-Control: no-cache
Sec-WebSocket-Key: IMAp9w+8epohmgOLbv9wbw==
Sec-WebSocket-Extensions: permessage-deflate; client_no_context_takeover; client_max_window_bits; server_max_window_bits=15
Sec-WebSocket-Version: 13
HTTP/1.1 101 Switching Protocols
Content-Length: 0
Date: Mon, 05 Jul 2021 09:40:48 GMT
Server: nbio
Upgrade: websocket
Connection: Upgrade
Sec-Websocket-Accept: 9wAb2cIoohsiOXprGcPF6K7xjew=
Sec-Websocket-Extensions: permessage-deflate; server_no_context_takeover; client_no_context_takeover


Closing Behavior

KeyValueDescription
isServerFalseTrue, iff I (the fuzzer) am a server, and the peer is a client.
closedByMeTrueTrue, iff I have initiated closing handshake (that is, did send close first).
failedByMeFalseTrue, iff I have failed the WS connection (i.e. due to protocol error). Failing can be either by initiating closing handshake or brutal drop TCP.
droppedByMeFalseTrue, iff I dropped the TCP connection.
wasCleanTrueTrue, iff full WebSocket closing handshake was performed (close frame sent and received) _and_ the server dropped the TCP (which is its responsibility).
wasNotCleanReasonNoneWhen wasClean == False, the reason what happened.
wasServerConnectionDropTimeoutFalseWhen we are a client, and we expected the server to drop the TCP, but that didn't happen in time, this gets True.
wasOpenHandshakeTimeoutFalseWhen performing the opening handshake, but the peer did not finish in time, this gets True.
wasCloseHandshakeTimeoutFalseWhen we initiated a closing handshake, but the peer did not respond in time, this gets True.
localCloseCode1000The close code I sent in close frame (if any).
localCloseReasonNoneThe close reason I sent in close frame (if any).
remoteCloseCode1000The close code the peer sent me in close frame (if any).
remoteCloseReasonNoneThe close reason the peer sent me in close frame (if any).


Wire Statistics

Octets Received by Chop Size

Chop SizeCountOctets
414
3011301
102810001028000
Total10021028305

Octets Transmitted by Chop Size

Chop SizeCountOctets
818
1601160
1633489
1643492
16671162
167101670
168101680
169142366
170264420
171244104
172417052
173406920
174468004
175457875
176559680
1776210974
178366408
1796010740
180437740
181519231
182295278
183397137
184386992
185285180
186244464
187427854
188336204
189356615
190295510
191142674
192142688
19391737
19481552
195112145
19681568
19771379
19961194
20051000
2024808
2053615
2061206
2074828
2081208
2094836
2101210
2112422
21251060
2133639
2153645
2214884
2234892
2253675
2272454
3771377
Total1002182105

Frames Received by Opcode

OpcodeCount
11000
81
Total1001

Frames Transmitted by Opcode

OpcodeCount
11000
81
Total1001


Wire Log

000 TX OCTETS: 474554202f6563686f2f6d65737361676520485454502f312e310d0a557365722d4167656e743a204175746f6261686e5465
               737453756974652f302e382e322d ...
001 RX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a436f6e74656e742d4c656e6774683a20
               300d0a446174653a204d6f6e2c20 ...
002 WIRELOG DISABLED
003 CLOSE CONNECTION AFTER 240.000000 sec
004 WIRELOG ENABLED
005 TX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASK=955af07f, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
               0x03e8
006 TX OCTETS: 8882955af07f96b2
007 RX OCTETS: 880203e8
008 RX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASKED=False, MASK=None
               0x03e8
009 TCP DROPPED BY PEER