HTTPS HTTP POST client-body-filter HTTP/1.1 200 OK Content-Length: 21 Content-Type: text/html Received your input. HTTP/1.1 200 OK Connection: close Content-Type: text/html X-Connection: swsclose Received your input. HTTP/1.1 200 Connection established HTTP/1.1 200 OK Content-Length: 21 Content-Type: text/html Received your input. HTTP/1.1 200 OK Connection: close Content-Type: text/html X-Connection: swsclose Received your input. https Attempt to apply client-body-filter{blafasel-to-bumfidel} to client request that does not completely arrive in time on a reused connection. (based on test 10) proxy # Sending the first request to appease the test framework. # We mainly care about the second request where we overwrite the Content-Length # header so curl sends less data than Privoxy expects. -s --insecure https://%HOSTIP:%HTTPSPORT/first-request/%TESTNUMBER --next -s --write-out '%{stderr}%{response_code}\n' --limit-rate 5000 -d "blafasel%repeat[100 x padding]%" -H "Content-Length: 8000" --insecure https://%HOSTIP:%HTTPSPORT/second-request/%TESTNUMBER 400