test67 2.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. <testcase>
  2. <info>
  3. <keywords>
  4. HTTP
  5. HTTP GET
  6. HTTP NTLM auth
  7. NTLM
  8. </keywords>
  9. </info>
  10. # Server-side
  11. <reply>
  12. <!-- no <data> in this test since we have NTLM from the start
  13. This is supposed to be returned when the server gets a first
  14. Authorization: NTLM line passed-in from the client -->
  15. <data1001>
  16. HTTP/1.1 401 Now gimme that second request of crap
  17. Server: Microsoft-IIS/5.0
  18. Content-Type: text/html; charset=iso-8859-1
  19. Content-Length: 34
  20. WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAACGggEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
  21. This is not the real page either!
  22. </data1001>
  23. # This is supposed to be returned when the server gets the second
  24. # Authorization: NTLM line passed-in from the client
  25. <data1002>
  26. HTTP/1.1 200 Things are fine in server land swsclose
  27. Server: Microsoft-IIS/5.0
  28. Content-Type: text/html; charset=iso-8859-1
  29. Content-Length: 32
  30. Finally, this is the real page!
  31. </data1002>
  32. <datacheck>
  33. HTTP/1.1 401 Now gimme that second request of crap
  34. Server: Microsoft-IIS/5.0
  35. Content-Type: text/html; charset=iso-8859-1
  36. Content-Length: 34
  37. WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAACGggEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
  38. HTTP/1.1 200 Things are fine in server land swsclose
  39. Server: Microsoft-IIS/5.0
  40. Content-Type: text/html; charset=iso-8859-1
  41. Content-Length: 32
  42. Finally, this is the real page!
  43. </datacheck>
  44. </reply>
  45. # Client-side
  46. <client>
  47. <features>
  48. NTLM
  49. SSL
  50. !SSPI
  51. </features>
  52. <server>
  53. http
  54. </server>
  55. <name>
  56. HTTP with NTLM authorization
  57. </name>
  58. <command>
  59. http://%HOSTIP:%HTTPPORT/%TESTNUMBER -u testuser:testpass --ntlm
  60. </command>
  61. </client>
  62. # Verify data after the test has been "shot"
  63. <verify>
  64. <protocol>
  65. GET /%TESTNUMBER HTTP/1.1
  66. Host: %HOSTIP:%HTTPPORT
  67. Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
  68. User-Agent: curl/%VERSION
  69. Accept: */*
  70. GET /%TESTNUMBER HTTP/1.1
  71. Host: %HOSTIP:%HTTPPORT
  72. Authorization: NTLM TlRMTVNTUAADAAAAGAAYAEAAAAAYABgAWAAAAAAAAABwAAAACAAIAHAAAAALAAsAeAAAAAAAAAAAAAAAhoIBAFpkQwKRCZFMhjj0tw47wEjKHRHlvzfxQamFcheMuv8v+xeqphEO5V41xRd7R9deOXRlc3R1c2VyV09SS1NUQVRJT04=
  73. User-Agent: curl/%VERSION
  74. Accept: */*
  75. </protocol>
  76. </verify>
  77. </testcase>