<testcase> <info> <keywords> MQTT MQTT SUBSCRIBE </keywords> </info> # # Server-side <reply> <data> </data> </reply> # # Client-side <client> <features> mqtt </features> <server> mqtt </server> <name> MQTT with very long user name </name> <file name="%LOGDIR/input%TESTNUMBER"> user = %repeat[65536 x a]%:fakepasswd </file> <command option="binary-trace"> mqtt://%HOSTIP:%MQTTPORT/%TESTNUMBER -K %LOGDIR/input%TESTNUMBER </command> </client> # # Verify data after the test has been "shot" <verify> # These are hexadecimal protocol dumps from the client # # Strip out the random part of the client id from the CONNECT message # before comparison <strippart> s/^(.* 00044d51545404c2003c000c6375726c).*/$1/ </strippart> # 8 is CURLE_WEIRD_SERVER_REPLY <errorcode> 8 </errorcode> </verify> </testcase>