1<testcase> 2<info> 3<keywords> 4HTTP 5HTTP POST 6HTTP NTLM auth 7</keywords> 8</info> 9 10# Server-side 11<reply> 12# the first request has NTLM type-1 included, and then the 1001 is returned 13<data1001> 14HTTP/1.1 200 beng swsclose swsbounce 15Server: Microsoft-IIS/6.0 16Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth 17Content-Type: text/html; charset=iso-8859-1 18 19</data1001> 20 21# the second request should be auth-less and then this is returned. 22<data> 23HTTP/1.1 200 moo swsclose 24Server: Microsoft-IIS/6.0 25Content-Type: text/html; charset=iso-8859-1 26Content-Length: 16 27 28content for you 29</data> 30 31<datacheck> 32HTTP/1.1 200 beng swsclose swsbounce 33Server: Microsoft-IIS/6.0 34Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth 35Content-Type: text/html; charset=iso-8859-1 36 37HTTP/1.1 200 moo swsclose 38Server: Microsoft-IIS/6.0 39Content-Type: text/html; charset=iso-8859-1 40Content-Length: 16 41 42content for you 43</datacheck> 44 45</reply> 46 47# Client-side 48<client> 49<features> 50NTLM 51SSL 52!SSPI 53</features> 54<server> 55http 56</server> 57<name> 58HTTP POST --ntlm to server not requiring any auth at all 59</name> 60<command> 61http://%HOSTIP:%HTTPPORT/%TESTNUMBER -u auser:apasswd --ntlm -d "junkelijunk" 62</command> 63</client> 64 65# Verify data after the test has been "shot" 66<verify> 67<protocol nonewline="yes"> 68POST /%TESTNUMBER HTTP/1.1 69Host: %HOSTIP:%HTTPPORT 70Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 71User-Agent: curl/%VERSION 72Accept: */* 73Content-Length: 0 74Content-Type: application/x-www-form-urlencoded 75 76POST /%TESTNUMBER HTTP/1.1 77Host: %HOSTIP:%HTTPPORT 78User-Agent: curl/%VERSION 79Accept: */* 80Content-Length: 11 81Content-Type: application/x-www-form-urlencoded 82 83junkelijunk 84</protocol> 85</verify> 86</testcase> 87