xref: /aosp_15_r20/external/curl/tests/data/test2203 (revision 6236dae45794135f37c4eb022389c904c8b0090d)
1*6236dae4SAndroid Build Coastguard Worker<testcase>
2*6236dae4SAndroid Build Coastguard Worker<info>
3*6236dae4SAndroid Build Coastguard Worker<keywords>
4*6236dae4SAndroid Build Coastguard WorkerMQTT
5*6236dae4SAndroid Build Coastguard WorkerMQTT SUBSCRIBE
6*6236dae4SAndroid Build Coastguard Worker</keywords>
7*6236dae4SAndroid Build Coastguard Worker</info>
8*6236dae4SAndroid Build Coastguard Worker
9*6236dae4SAndroid Build Coastguard Worker#
10*6236dae4SAndroid Build Coastguard Worker# Server-side
11*6236dae4SAndroid Build Coastguard Worker<reply>
12*6236dae4SAndroid Build Coastguard Worker<data nocheck="yes">
13*6236dae4SAndroid Build Coastguard Workerhello
14*6236dae4SAndroid Build Coastguard Worker</data>
15*6236dae4SAndroid Build Coastguard Worker<datacheck hex="yes">
16*6236dae4SAndroid Build Coastguard Worker00 04 31 31 39 30   68 65 6c 6c 6f 5b 4c 46 5d 0a
17*6236dae4SAndroid Build Coastguard Worker</datacheck>
18*6236dae4SAndroid Build Coastguard Worker
19*6236dae4SAndroid Build Coastguard Worker# error 5 - "Connection Refused, not authorized. No user or password supplied"
20*6236dae4SAndroid Build Coastguard Worker<servercmd>
21*6236dae4SAndroid Build Coastguard Workererror-CONNACK 5
22*6236dae4SAndroid Build Coastguard Worker</servercmd>
23*6236dae4SAndroid Build Coastguard Worker</reply>
24*6236dae4SAndroid Build Coastguard Worker
25*6236dae4SAndroid Build Coastguard Worker#
26*6236dae4SAndroid Build Coastguard Worker# Client-side
27*6236dae4SAndroid Build Coastguard Worker<client>
28*6236dae4SAndroid Build Coastguard Worker<features>
29*6236dae4SAndroid Build Coastguard Workermqtt
30*6236dae4SAndroid Build Coastguard Worker</features>
31*6236dae4SAndroid Build Coastguard Worker<server>
32*6236dae4SAndroid Build Coastguard Workermqtt
33*6236dae4SAndroid Build Coastguard Worker</server>
34*6236dae4SAndroid Build Coastguard Worker<name>
35*6236dae4SAndroid Build Coastguard WorkerMQTT with error in CONNACK
36*6236dae4SAndroid Build Coastguard Worker</name>
37*6236dae4SAndroid Build Coastguard Worker<command option="binary-trace">
38*6236dae4SAndroid Build Coastguard Workermqtt://%HOSTIP:%MQTTPORT/%TESTNUMBER
39*6236dae4SAndroid Build Coastguard Worker</command>
40*6236dae4SAndroid Build Coastguard Worker</client>
41*6236dae4SAndroid Build Coastguard Worker
42*6236dae4SAndroid Build Coastguard Worker#
43*6236dae4SAndroid Build Coastguard Worker# Verify data after the test has been "shot"
44*6236dae4SAndroid Build Coastguard Worker<verify>
45*6236dae4SAndroid Build Coastguard Worker# These are hexadecimal protocol dumps from the client
46*6236dae4SAndroid Build Coastguard Worker#
47*6236dae4SAndroid Build Coastguard Worker# Strip out the random part of the client id from the CONNECT message
48*6236dae4SAndroid Build Coastguard Worker# before comparison
49*6236dae4SAndroid Build Coastguard Worker<strippart>
50*6236dae4SAndroid Build Coastguard Workers/^(.* 00044d5154540402003c000c6375726c).*/$1/
51*6236dae4SAndroid Build Coastguard Worker</strippart>
52*6236dae4SAndroid Build Coastguard Worker<protocol>
53*6236dae4SAndroid Build Coastguard Workerclient CONNECT 18 00044d5154540402003c000c6375726c
54*6236dae4SAndroid Build Coastguard Workerserver CONNACK 2 20020005
55*6236dae4SAndroid Build Coastguard Worker</protocol>
56*6236dae4SAndroid Build Coastguard Worker
57*6236dae4SAndroid Build Coastguard Worker# 8 is CURLE_WEIRD_SERVER_REPLY
58*6236dae4SAndroid Build Coastguard Worker<errorcode>
59*6236dae4SAndroid Build Coastguard Worker8
60*6236dae4SAndroid Build Coastguard Worker</errorcode>
61*6236dae4SAndroid Build Coastguard Worker</verify>
62*6236dae4SAndroid Build Coastguard Worker</testcase>
63