<testcase>
<info>
<keywords>
HTTPS
HTTP POST
client-body-filter
</keywords>
</info>

<reply>
<data>
HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html

Received your input.
</data>
<data1>
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
X-Connection: swsclose

Received your input.
</data1>
</reply>

<proxy-reply>
<data>
HTTP/1.1 200 Connection established

HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html

Received your input.
</data>
<data1>
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
X-Connection: swsclose

Received your input.
</data1>
</proxy-reply>

<client>
<server>
https
</server>
<name>
Applying client-body-filter{blafasel-to-bumfidel} to client request on a reused connection that is too large to read at once (based on test 5)
</name>
<features>
proxy
</features>
<command>
--insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -d "blafasel%repeat[5000 x padding]%" --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
</command>
</client>

<verify>
<protocol nonewline="yes">
GET /%TESTNUMBER HTTP/1.1
Host: %HOSTIP:%HTTPSPORT
User-Agent: curl/%VERSION
Accept: */*

POST /%TESTNUMBER HTTP/1.1
Host: %HOSTIP:%HTTPSPORT
User-Agent: curl/%VERSION
Accept: */*
Content-Length: 35008
Content-Type: application/x-www-form-urlencoded

bumfidel%repeat[5000 x padding]%
</protocol>
</verify>
</testcase>
