File: test9

package info (click to toggle)
privoxy 4.1.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 8,488 kB
  • sloc: ansic: 33,393; perl: 4,813; sh: 3,940; makefile: 146; awk: 18; xml: 14
file content (64 lines) | stat: -rw-r--r-- 1,270 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
<?xml version="1.0" encoding="US-ASCII"?>
<testcase>
<info>
<keywords>
HTTPS
HTTP POST
client-body-filter
# This test currently doesn't work as Privoxy truncates the request.
# Sending no Content-Length header is an error but truncating the
# request still doesn't seem ideal. Probably Privoxy should reject
# the request instead of forwarding it.
skip
</keywords>
</info>

<reply>
<data>
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html

Received your input.
</data>
</reply>

<proxy-reply>
<data>
HTTP/1.1 200 Connection established%CR
%CR
HTTP/1.1 200 OK%CR
Connection: close%CR
Content-Type: text/html%CR
%CR
Received your input.
</data>
</proxy-reply>

<client>
<server>
https
</server>
<name>
Attempt to apply client-body-filter{blafasel-to-bumfidel} to client request without Content-Length header
</name>
<features>
proxy
</features>
<command>
--limit-rate 1000 -d "blafasel%repeat[5000 x padding]%" -H "Content-Length:" --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
</command>
</client>

<verify>
<protocol nonewline="yes">
POST /%TESTNUMBER HTTP/1.1%CR
Host: %HOSTIP:%HTTPSPORT%CR
User-Agent: curl/%VERSION%CR
Accept: */*%CR
Content-Type: application/x-www-form-urlencoded%CR
%CR
bumfidel%repeat[5000 x padding]%
</protocol>
</verify>
</testcase>