xref: /curl/tests/data/test176 (revision 3fd80c7b)
1<testcase>
2<info>
3<keywords>
4HTTP
5HTTP POST
6HTTP NTLM auth
7</keywords>
8</info>
9
10# Server-side
11<reply>
12# the first request has NTLM type-1 included, and then the 1001 is returned
13<data1001>
14HTTP/1.1 200 beng swsclose swsbounce
15Server: Microsoft-IIS/6.0
16Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth
17Content-Type: text/html; charset=iso-8859-1
18
19</data1001>
20
21# the second request should be auth-less and then this is returned.
22<data>
23HTTP/1.1 200 moo swsclose
24Server: Microsoft-IIS/6.0
25Content-Type: text/html; charset=iso-8859-1
26Content-Length: 16
27
28content for you
29</data>
30
31<datacheck>
32HTTP/1.1 200 beng swsclose swsbounce
33Server: Microsoft-IIS/6.0
34Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth
35Content-Type: text/html; charset=iso-8859-1
36
37HTTP/1.1 200 moo swsclose
38Server: Microsoft-IIS/6.0
39Content-Type: text/html; charset=iso-8859-1
40Content-Length: 16
41
42content for you
43</datacheck>
44
45</reply>
46
47# Client-side
48<client>
49<features>
50NTLM
51SSL
52!SSPI
53</features>
54<server>
55http
56</server>
57<name>
58HTTP POST --ntlm to server not requiring any auth at all
59</name>
60<command>
61http://%HOSTIP:%HTTPPORT/%TESTNUMBER -u auser:apasswd --ntlm -d "junkelijunk"
62</command>
63</client>
64
65# Verify data after the test has been "shot"
66<verify>
67<protocol nonewline="yes">
68POST /%TESTNUMBER HTTP/1.1
69Host: %HOSTIP:%HTTPPORT
70Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
71User-Agent: curl/%VERSION
72Accept: */*
73Content-Length: 0
74Content-Type: application/x-www-form-urlencoded
75
76POST /%TESTNUMBER HTTP/1.1
77Host: %HOSTIP:%HTTPPORT
78User-Agent: curl/%VERSION
79Accept: */*
80Content-Length: 11
81Content-Type: application/x-www-form-urlencoded
82
83junkelijunk
84</protocol>
85</verify>
86</testcase>
87