test176 (1779B)
1 <testcase> 2 <info> 3 <keywords> 4 HTTP 5 HTTP POST 6 HTTP NTLM auth 7 </keywords> 8 </info> 9 10 # Server-side 11 <reply> 12 # the first request has NTLM type-1 included, and then the 1001 is returned 13 <data1001> 14 HTTP/1.1 200 beng swsclose 15 Server: Microsoft-IIS/6.0 16 Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth 17 Content-Type: text/html; charset=iso-8859-1 18 19 </data1001> 20 21 # the second request should be auth-less and then this is returned. 22 <data> 23 HTTP/1.1 200 moo swsclose 24 Server: Microsoft-IIS/6.0 25 Content-Type: text/html; charset=iso-8859-1 26 Content-Length: 16 27 28 content for you 29 </data> 30 31 <datacheck> 32 HTTP/1.1 200 beng swsclose 33 Server: Microsoft-IIS/6.0 34 Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth 35 Content-Type: text/html; charset=iso-8859-1 36 37 HTTP/1.1 200 moo swsclose 38 Server: Microsoft-IIS/6.0 39 Content-Type: text/html; charset=iso-8859-1 40 Content-Length: 16 41 42 content for you 43 </datacheck> 44 45 </reply> 46 47 # Client-side 48 <client> 49 <features> 50 NTLM 51 SSL 52 !SSPI 53 </features> 54 <server> 55 http 56 </server> 57 <name> 58 HTTP POST --ntlm to server not requiring any auth at all 59 </name> 60 <command> 61 http://%HOSTIP:%HTTPPORT/%TESTNUMBER -u auser:apasswd --ntlm -d "junkelijunk" 62 </command> 63 </client> 64 65 # Verify data after the test has been "shot" 66 <verify> 67 <protocol nonewline="yes"> 68 POST /%TESTNUMBER HTTP/1.1 69 Host: %HOSTIP:%HTTPPORT 70 Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 71 User-Agent: curl/%VERSION 72 Accept: */* 73 Content-Length: 0 74 Content-Type: application/x-www-form-urlencoded 75 76 POST /%TESTNUMBER HTTP/1.1 77 Host: %HOSTIP:%HTTPPORT 78 User-Agent: curl/%VERSION 79 Accept: */* 80 Content-Length: 11 81 Content-Type: application/x-www-form-urlencoded 82 83 junkelijunk 84 </protocol> 85 </verify> 86 </testcase>