1<testcase>
2# Server-side
3<reply>
4# the first request has NTLM type-1 included, and then the 1001 is returned
5<data1001>
6HTTP/1.1 200 beng swsclose swsbounce
7Server: Microsoft-IIS/6.0
8Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth
9Content-Type: text/html; charset=iso-8859-1
10
11</data1001>
12
13# the second request should be auth-less and then this is returned.
14<data>
15HTTP/1.1 200 moo swsclose
16Server: Microsoft-IIS/6.0
17Content-Type: text/html; charset=iso-8859-1
18Content-Length: 16
19
20content for you
21</data>
22
23<datacheck>
24HTTP/1.1 200 beng swsclose swsbounce
25Server: Microsoft-IIS/6.0
26Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth
27Content-Type: text/html; charset=iso-8859-1
28
29HTTP/1.1 200 moo swsclose
30Server: Microsoft-IIS/6.0
31Content-Type: text/html; charset=iso-8859-1
32Content-Length: 16
33
34content for you
35</datacheck>
36
37</reply>
38
39# Client-side
40<client>
41<features>
42NTLM
43</features>
44<server>
45http
46</server>
47 <name>
48HTTP POST --ntlm to server not requiring any auth at all
49 </name>
50 <command>
51http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
52</command>
53</client>
54
55# Verify data after the test has been "shot"
56<verify>
57<strip>
58^User-Agent:.*
59</strip>
60<protocol nonewline="yes">
61POST /176 HTTP/1.1
62Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
63User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6
64Host: %HOSTIP:%HTTPPORT
65Accept: */*
66Content-Length: 0
67Content-Type: application/x-www-form-urlencoded
68
69POST /176 HTTP/1.1
70User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6
71Host: %HOSTIP:%HTTPPORT
72Accept: */*
73Content-Length: 11
74Content-Type: application/x-www-form-urlencoded
75
76junkelijunk
77</protocol>
78</verify>
79</testcase>
80