<?xml version="1.0" encoding="US-ASCII"?>
<testcase>
<info>
<keywords>
HTTPS
HTTP POST
client-body-filter
</keywords>
</info>

<reply>
<data>
HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html

Received your input.
</data>
<data1>
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
X-Connection: swsclose

Received your input.
</data1>
</reply>

<proxy-reply>
<data>
HTTP/1.1 200 Connection established%CR
%CR
HTTP/1.1 200 OK%CR
Content-Length: 21%CR
Content-Type: text/html%CR
%CR
Received your input.
</data>
<data1>
HTTP/1.1 200 OK%CR
Connection: close%CR
Content-Type: text/html%CR
X-Connection: swsclose%CR
%CR
Received your input.
</data1>
</proxy-reply>

<client>
<server>
https
</server>
<name>
Applying client-body-filter{blafasel-to-bumfidel} to client request on a reused connection that is too large to read at once (based on test 5)
</name>
<features>
proxy
</features>
<command>
--insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -d "blafasel%repeat[5000 x padding]%" --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
</command>
</client>

<verify>
<protocol nonewline="yes">
GET /%TESTNUMBER HTTP/1.1%CR
Host: %HOSTIP:%HTTPSPORT%CR
User-Agent: curl/%VERSION%CR
Accept: */*%CR
%CR
POST /%TESTNUMBER HTTP/1.1%CR
Host: %HOSTIP:%HTTPSPORT%CR
User-Agent: curl/%VERSION%CR
Accept: */*%CR
Content-Length: 35008%CR
Content-Type: application/x-www-form-urlencoded%CR
%CR
bumfidel%repeat[5000 x padding]%
</protocol>
</verify>
</testcase>
