2
0

test176 1.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788
  1. <testcase>
  2. <info>
  3. <keywords>
  4. HTTP
  5. HTTP POST
  6. HTTP NTLM auth
  7. </keywords>
  8. </info>
  9. # Server-side
  10. <reply>
  11. # the first request has NTLM type-1 included, and then the 1001 is returned
  12. <data1001>
  13. HTTP/1.1 200 beng swsclose swsbounce
  14. Server: Microsoft-IIS/6.0
  15. Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth
  16. Content-Type: text/html; charset=iso-8859-1
  17. </data1001>
  18. # the second request should be auth-less and then this is returned.
  19. <data>
  20. HTTP/1.1 200 moo swsclose
  21. Server: Microsoft-IIS/6.0
  22. Content-Type: text/html; charset=iso-8859-1
  23. Content-Length: 16
  24. content for you
  25. </data>
  26. <datacheck>
  27. HTTP/1.1 200 beng swsclose swsbounce
  28. Server: Microsoft-IIS/6.0
  29. Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth
  30. Content-Type: text/html; charset=iso-8859-1
  31. HTTP/1.1 200 moo swsclose
  32. Server: Microsoft-IIS/6.0
  33. Content-Type: text/html; charset=iso-8859-1
  34. Content-Length: 16
  35. content for you
  36. </datacheck>
  37. </reply>
  38. # Client-side
  39. <client>
  40. <features>
  41. NTLM
  42. !SSPI
  43. </features>
  44. <server>
  45. http
  46. </server>
  47. <name>
  48. HTTP POST --ntlm to server not requiring any auth at all
  49. </name>
  50. <command>
  51. http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
  52. </command>
  53. </client>
  54. # Verify data after the test has been "shot"
  55. <verify>
  56. <strip>
  57. ^User-Agent:.*
  58. </strip>
  59. <protocol nonewline="yes">
  60. POST /176 HTTP/1.1
  61. Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
  62. User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6
  63. Host: %HOSTIP:%HTTPPORT
  64. Accept: */*
  65. Content-Length: 0
  66. Content-Type: application/x-www-form-urlencoded
  67. POST /176 HTTP/1.1
  68. User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6
  69. Host: %HOSTIP:%HTTPPORT
  70. Accept: */*
  71. Content-Length: 11
  72. Content-Type: application/x-www-form-urlencoded
  73. junkelijunk
  74. </protocol>
  75. </verify>
  76. </testcase>