1*6236dae4SAndroid Build Coastguard Worker<testcase> 2*6236dae4SAndroid Build Coastguard Worker<info> 3*6236dae4SAndroid Build Coastguard Worker<keywords> 4*6236dae4SAndroid Build Coastguard WorkerMQTT 5*6236dae4SAndroid Build Coastguard WorkerMQTT SUBSCRIBE 6*6236dae4SAndroid Build Coastguard Worker</keywords> 7*6236dae4SAndroid Build Coastguard Worker</info> 8*6236dae4SAndroid Build Coastguard Worker 9*6236dae4SAndroid Build Coastguard Worker# 10*6236dae4SAndroid Build Coastguard Worker# Server-side 11*6236dae4SAndroid Build Coastguard Worker<reply> 12*6236dae4SAndroid Build Coastguard Worker<data> 13*6236dae4SAndroid Build Coastguard Worker</data> 14*6236dae4SAndroid Build Coastguard Worker</reply> 15*6236dae4SAndroid Build Coastguard Worker 16*6236dae4SAndroid Build Coastguard Worker# 17*6236dae4SAndroid Build Coastguard Worker# Client-side 18*6236dae4SAndroid Build Coastguard Worker<client> 19*6236dae4SAndroid Build Coastguard Worker<features> 20*6236dae4SAndroid Build Coastguard Workermqtt 21*6236dae4SAndroid Build Coastguard Worker</features> 22*6236dae4SAndroid Build Coastguard Worker<server> 23*6236dae4SAndroid Build Coastguard Workermqtt 24*6236dae4SAndroid Build Coastguard Worker</server> 25*6236dae4SAndroid Build Coastguard Worker<name> 26*6236dae4SAndroid Build Coastguard WorkerMQTT with very long user name 27*6236dae4SAndroid Build Coastguard Worker</name> 28*6236dae4SAndroid Build Coastguard Worker<file name="%LOGDIR/input%TESTNUMBER"> 29*6236dae4SAndroid Build Coastguard Workeruser = %repeat[65536 x a]%:fakepasswd 30*6236dae4SAndroid Build Coastguard Worker</file> 31*6236dae4SAndroid Build Coastguard Worker<command option="binary-trace"> 32*6236dae4SAndroid Build Coastguard Workermqtt://%HOSTIP:%MQTTPORT/%TESTNUMBER -K %LOGDIR/input%TESTNUMBER 33*6236dae4SAndroid Build Coastguard Worker</command> 34*6236dae4SAndroid Build Coastguard Worker</client> 35*6236dae4SAndroid Build Coastguard Worker 36*6236dae4SAndroid Build Coastguard Worker# 37*6236dae4SAndroid Build Coastguard Worker# Verify data after the test has been "shot" 38*6236dae4SAndroid Build Coastguard Worker<verify> 39*6236dae4SAndroid Build Coastguard Worker# These are hexadecimal protocol dumps from the client 40*6236dae4SAndroid Build Coastguard Worker# 41*6236dae4SAndroid Build Coastguard Worker# Strip out the random part of the client id from the CONNECT message 42*6236dae4SAndroid Build Coastguard Worker# before comparison 43*6236dae4SAndroid Build Coastguard Worker<strippart> 44*6236dae4SAndroid Build Coastguard Workers/^(.* 00044d51545404c2003c000c6375726c).*/$1/ 45*6236dae4SAndroid Build Coastguard Worker</strippart> 46*6236dae4SAndroid Build Coastguard Worker# 8 is CURLE_WEIRD_SERVER_REPLY 47*6236dae4SAndroid Build Coastguard Worker<errorcode> 48*6236dae4SAndroid Build Coastguard Worker8 49*6236dae4SAndroid Build Coastguard Worker</errorcode> 50*6236dae4SAndroid Build Coastguard Worker</verify> 51*6236dae4SAndroid Build Coastguard Worker</testcase> 52