WebSockets
ws: Unsolicited PONG
Debug
ws
http
lib2700
ws://%HOSTIP:%HTTPPORT/%TESTNUMBER
CURL_WS_FORCE_ZERO_MASK=1
upgrade
# Full list of frames: see below
# An unsolicited PONG with and without payload
HTTP/1.1 101 Switching to WebSockets
Server: server/%TESTNUMBER
Upgrade: Websocket
Connection: Upgrade
Sec-WebSocket-Accept: HkPsVga7+8LuxM4RGQ5p9tZHeYs=
%hex[%8a%00]hex%%hex[%8a%04pong]hex%%hex[%88%00]hex%
# Exact echo of reply data with additional masking
%hex[%8a%80%00%00%00%00]hex%%hex[%8a%84%00%00%00%00pong]hex%%hex[%88%80%00%00%00%00]hex%
pong [0]
pong [4] pong
close [0]
# CURLE_OK
0
# Strip HTTP header from
^GET /.*
^(Host|User-Agent|Accept|Upgrade|Connection|Sec-WebSocket-(Version|Key)): .*
^\s*$