WebSockets ws: Unsolicited PONG Debug ws http lib2700 ws://%HOSTIP:%HTTPPORT/%TESTNUMBER CURL_WS_FORCE_ZERO_MASK=1 upgrade # Full list of frames: see below # An unsolicited PONG with and without payload HTTP/1.1 101 Switching to WebSockets Server: server/%TESTNUMBER Upgrade: Websocket Connection: Upgrade Sec-WebSocket-Accept: HkPsVga7+8LuxM4RGQ5p9tZHeYs= %hex[%8a%00]hex%%hex[%8a%04pong]hex%%hex[%88%00]hex% # Exact echo of reply data with additional masking %hex[%8a%80%00%00%00%00]hex%%hex[%8a%84%00%00%00%00pong]hex%%hex[%88%80%00%00%00%00]hex% pong [0] pong [4] pong close [0] # CURLE_OK 0 # Strip HTTP header from ^GET /.* ^(Host|User-Agent|Accept|Upgrade|Connection|Sec-WebSocket-(Version|Key)): .* ^\s*$