test67 2.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283
  1. # Server-side
  2. <reply>
  3. # no <data> in this test since we have NTLM from the start
  4. # This is supposed to be returned when the server gets a first
  5. # Authorization: NTLM line passed-in from the client
  6. <data1001>
  7. HTTP/1.1 401 Now gimme that second request of crap
  8. Server: Microsoft-IIS/5.0
  9. Content-Type: text/html; charset=iso-8859-1
  10. Content-Length: 34
  11. WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
  12. This is not the real page either!
  13. </data1001>
  14. # This is supposed to be returned when the server gets the second
  15. # Authorization: NTLM line passed-in from the client
  16. <data1002>
  17. HTTP/1.1 200 Things are fine in server land swsclose
  18. Server: Microsoft-IIS/5.0
  19. Content-Type: text/html; charset=iso-8859-1
  20. Finally, this is the real page!
  21. </data1002>
  22. <datacheck>
  23. HTTP/1.1 401 Now gimme that second request of crap
  24. Server: Microsoft-IIS/5.0
  25. Content-Type: text/html; charset=iso-8859-1
  26. Content-Length: 34
  27. WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
  28. HTTP/1.1 200 Things are fine in server land swsclose
  29. Server: Microsoft-IIS/5.0
  30. Content-Type: text/html; charset=iso-8859-1
  31. Finally, this is the real page!
  32. </datacheck>
  33. </reply>
  34. # Client-side
  35. <client>
  36. # NTLM only works if SSL-support is present
  37. <features>
  38. SSL
  39. </features>
  40. <server>
  41. http
  42. </server>
  43. <name>
  44. HTTP with NTLM authorization
  45. </name>
  46. <command>
  47. http://%HOSTIP:%HOSTPORT/67 -u testuser:testpass --ntlm
  48. </command>
  49. </test>
  50. # Verify data after the test has been "shot"
  51. <verify>
  52. <strip>
  53. ^User-Agent:.*
  54. </strip>
  55. <protocol>
  56. GET /67 HTTP/1.1
  57. Authorization: NTLM TlRMTVNTUAABAAAAAgIAAAAAAAAgAAAAAAAAACAAAAA=
  58. User-Agent: curl/7.10.6-pre1 (i686-pc-linux-gnu) libcurl/7.10.6-pre1 OpenSSL/0.9.7a ipv6 zlib/1.1.3
  59. Host: 127.0.0.1:8999
  60. Pragma: no-cache
  61. Accept: */*
  62. GET /67 HTTP/1.1
  63. Authorization: NTLM TlRMTVNTUAADAAAAGAAYAEgAAAAAAAAAYAAAAAAAAABAAAAACAAIAEAAAAAAAAAASAAAAAAAAABgAAAAAYIAAHRlc3R1c2VyWmRDApEJkUyGOPS3DjvASModEeW/N/FB
  64. User-Agent: curl/7.10.6-pre1 (i686-pc-linux-gnu) libcurl/7.10.6-pre1 OpenSSL/0.9.7a ipv6 zlib/1.1.3
  65. Host: 127.0.0.1:8999
  66. Pragma: no-cache
  67. Accept: */*
  68. </protocol>
  69. </verify>